An out-of-bounds write flaw was found in the way Pidgin processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.
Upstream fixes (from the Git mirror):
commit 2f79c62fde05b7e24dfaa421a03529ec593a7190
Author: Eion Robb <eionrobb>
Date: Mon Feb 20 21:05:32 2017 +0000
Use the more robust entity processing that @dequisdequis came up with
--HG--
branch : EionRobb/fix-for-crash-when-sending-invalid-xml-e-1487474010880
commit f2e987f01f58202d8a9b665eb1d8e1152fe399a2
Author: Eion Robb <eionrobb>
Date: Sun Feb 19 03:13:47 2017 +0000
Fix for crash when sending invalid xml entities separated by whitespace, eg "&# 3000;"
--HG--
branch : EionRobb/fix-for-crash-when-sending-invalid-xml-e-1487474010880