Bug 684685 (CVE-2011-4922)

Summary: CVE-2011-4922 Cipher API information disclosure in pidgin
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bressers, ddumas, jlieskov, jrusnack, mbarnes
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-07-30 13:07:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 684119, 684120    
Bug Blocks:    

Description Huzaifa S. Sidhpurwala 2011-03-14 08:42:15 UTC
It was discovered that libpurple versions prior to 2.7.10 
do not properly clear certain data structures used in libpurple/cipher.c 
prior to freeing. 
An attacker could potentially extract partial information from memory 
regions freed by libpurple.

References:
http://pidgin.im/news/security/?id=50

This is fixed in pidgin version 2.7.10

Comment 3 Huzaifa S. Sidhpurwala 2011-03-14 08:45:55 UTC
Created pidgin tracking bugs for this issue

Affects: fedora-all [bug 684120]

Comment 6 Jan Lieskovsky 2011-03-21 14:23:53 UTC
CVE Request:
[2] http://www.openwall.com/lists/oss-security/2011/03/21/6

Comment 7 errata-xmlrpc 2011-05-19 11:09:11 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0616 https://rhn.redhat.com/errata/RHSA-2011-0616.html

Comment 8 errata-xmlrpc 2011-05-19 13:41:14 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0616 https://rhn.redhat.com/errata/RHSA-2011-0616.html

Comment 9 Vincent Danen 2012-01-09 22:25:04 UTC
A CVE was finally issued (CVE-2011-4922):

http://www.openwall.com/lists/oss-security/2012/01/04/13

Comment 10 Vincent Danen 2012-01-09 22:28:32 UTC
Statement:

The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue in Red Hat Enterprise Linux 4 or 5 (it has been addressed in Red Hat Enterprise Linux 6). For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 11 Vincent Danen 2012-01-09 22:29:01 UTC
Pidgin 2.6.6 (shipped with Red Hat Enterprise Linux 4 and 5) is affected by this.