{"id":"MGASA-2016-0125","summary":"Updated pidgin-otr packages fix security vulnerability","details":"The pidgin-otr plugin before 4.0.2 is vulnerable to a heap use after free\nerror. The bug is triggered when a user tries to authenticate a buddy and\nhappens in the function create_smp_dialog (CVE-2015-8833).\n","modified":"2026-04-16T01:45:27.544952169Z","published":"2016-03-25T06:38:37Z","upstream":["CVE-2015-8833"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0125.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17933"},{"type":"WEB","url":"https://blog.fuzzing-project.org/39-Heap-use-after-free-in-Pidgin-OTR-plugin.html"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2016/03/09/13"}],"affected":[{"package":{"name":"pidgin-otr","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/pidgin-otr?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.2-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0125.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}