update for pidgin

The following issues were fixed in this update:
+ General:
- Check the basic constraints extension when validating
SSL/TLS certificates. This fixes a security hole that allowed
a malicious man-in-the-middle to impersonate an IM server or
any other https endpoint. This affected both the NSS and
GnuTLS plugins (CVE-2014-3694, boo#902495).
- Allow and prefer TLS 1.2 and 1.1 when using the NSS plugin
for SSL (im#15909).
+ libpurple3 compatibility:
- Encrypted account passwords are preserved until the new one
is set.
- Fix loading Google Talk and Facebook XMPP accounts.
+ Groupwise: Fix potential remote crash parsing server message
that indicates that a large amount of memory should be
allocated (CVE-2014-3696, boo#902410).
+ IRC: Fix a possible leak of unencrypted data when using /me
command with OTR (im#15750).
+ MXit: Fix potential remote crash parsing a malformed emoticon
response (CVE-2014-3695, boo#902409).
+ XMPP:
- Fix potential information leak where a malicious XMPP server
and possibly even a malicious remote user could create a
carefully crafted XMPP message that causes libpurple to send
an XMPP message containing arbitrary memory (CVE-2014-3698,
boo#902408).
+ Yahoo: Fix login when using the GnuTLS library for TLS
connections (im#16172, boo#874606).

Fixed bugs
bnc#902408
CVE-2014-3698 pidgin: remote information leak via crafted XMPP message
bnc#902410
CVE-2014-3696: pidgin: denial of service parsing Groupwise server message
bnc#902409
CVE-2014-3695: pidgin: crash in MXit protocol plug-in
bnc#853038
pidgin xmpp video support missing
bnc#874606
Pidgin (2.9.10) does not connect to Yahoo anymore
bnc#902495
VUL-0: CVE-2014-3694: pidgin: SSL/TLS plug-ins failed to check Basic Constraints
Selected Binaries
openSUSE Build Service is sponsored by