pidgin/nest

1f078d295019
Add an alias for /development/wiki/GetABacktrace to the debugging page

Testing Done:
Ran `npm hugo:server` and verified that `/development/wiki/GetABacktrace` redirected to `/development/debugging'

Reviewed at https://reviews.imfreedom.org/r/3029/
---
title: cve-2009-2694-00
date: 2009-08-18T00:00:00.000Z
cveNumber: cve-2009-2694
summary: MSN overflow parsing SLP messages
discoveredBy: Core Security Technologies
fixedInRelease: 2.5.9
type: security
layout: cve
hidden: true
---
### Description
By sending two consecutive specially crafted SLP messages it is possible to
trigger an memcpy to an invalid location in memory. This affects all versions of
libpurple and Gaim released in the past few years.
### Mitigation
Correctly destroy outgoing SLP ACK messages after they are sent, and ensure a
buffer has been allocated within the SLP data structure before attempting to
write to it.