Buffer overflow vulnerability removed, adds support for GNOME3 proxy settings

Jul 6, 2012 08:41 GMT  ·  By
Buffer overflow vulnerability removed, adds support for GNOME3 proxy settings
   Buffer overflow vulnerability removed, adds support for GNOME3 proxy settings

The new version for Pidgin is 2.10.5. The changelog is not extensive, but comprises fixes for important issues.

Among the entries, there is also an improvement for the core of the instant messenger, libpurple. It consists in support for reading GNOME3 proxy settings.

As for the repairs available in this release, they address significant issues, such as a crash that may occur when trying to ignore a user that is not in the current chatroom.

On the same note, the developer did away with a buffer overflow vulnerability. The anomaly would occur upon parsing incoming messages that contained inline images.

Another fix in Pidgin 2.10.5 refers to building with MSVC on Windows, which was broken in the previous release of the multi-protocol instant messenger and caused it to crash when trying to connect to MSN, on 64-bit Windows 7.

Download Pidgin for Windows; portable version here.
Download Pidgin for Linux