Secunia Security Advisory - SUSE has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
07b2cf758cad31b5b1f8b7889eb5f22591c3e1970ef3d624ce3b059750cd608c
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
SUSE update for evolution
SECUNIA ADVISORY ID:
SA29317
VERIFY ADVISORY:
http://secunia.com/advisories/29317/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
OPERATING SYSTEM:
SUSE Linux 10.1
http://secunia.com/product/10796/
openSUSE 10.2
http://secunia.com/product/13375/
openSUSE 10.3
http://secunia.com/product/16124/
DESCRIPTION:
SUSE has issued an update for evolution. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.
For more information:
SA29057
SOLUTION:
Apply updated packages.
x86 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/evolution-2.12.0-5.6.i586.rpm
4a13b961952e7913af466ef1738c0196
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/evolution-devel-2.12.0-5.6.i586.rpm
2ecaf3f223841665df554aa8e20d5978
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/evolution-pilot-2.12.0-5.6.i586.rpm
d06a664885565b04774d5d3c2afb84f5
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/evolution-2.8.2-9.i586.rpm
c7949a1af35d7abdb7a36fd7fc90607b
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/evolution-devel-2.8.2-9.i586.rpm
eadabc26ef71fbb91c498f202196e640
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/evolution-pilot-2.8.2-9.i586.rpm
b8a8b80039aa8f1641c0103bb04f75a0
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/evolution-2.6.0-49.66.3.i586.rpm
cc40ee93e3f2043a25dff22e62bc4e4e
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/evolution-devel-2.6.0-49.66.3.i586.rpm
b7fb5fec304a0e623be28233a66525ad
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/evolution-pilot-2.6.0-49.66.3.i586.rpm
d2833e3948641af99a9e76026da6e8da
Power PC Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/evolution-2.12.0-5.6.ppc.rpm
a6e9d56b825c7809bc62a87f546bdb50
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/evolution-devel-2.12.0-5.6.ppc.rpm
772ce1adbb46a5ba5f703bf4dcfbd49e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/evolution-pilot-2.12.0-5.6.ppc.rpm
946a9756bab858d4242736e055009173
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/evolution-2.8.2-9.ppc.rpm
fa5ed56ee0d3a6718015bf722e34ff6f
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/evolution-devel-2.8.2-9.ppc.rpm
91565615e83f40a40d435e9edcca2a63
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/evolution-pilot-2.8.2-9.ppc.rpm
443a51070cdb147473536fec3b704533
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/evolution-2.6.0-49.66.3.ppc.rpm
8b0beec2e2ecad7969fc91aa12c963d2
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/evolution-devel-2.6.0-49.66.3.ppc.rpm
46706e204d46f01026af35b861c101a6
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/evolution-pilot-2.6.0-49.66.3.ppc.rpm
0c946a3533d2a55812f0fd60886e097f
x86-64 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/evolution-2.12.0-5.6.x86_64.rpm
6c9f98241bf08edc4a77d52c4232ed60
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/evolution-devel-2.12.0-5.6.x86_64.rpm
bab5d0660dbb9076bd865ccae25bc68d
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/evolution-pilot-2.12.0-5.6.x86_64.rpm
44778c1ea873e4e54021ce3588f406de
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/evolution-2.8.2-9.x86_64.rpm
8ac28a5b6875266d281400060867b45f
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/evolution-devel-2.8.2-9.x86_64.rpm
970d89a3ae7574334586a6b9388e1073
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/evolution-pilot-2.8.2-9.x86_64.rpm
6ffb4564be38436e91a0b10b908ff18d
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/evolution-2.6.0-49.66.3.x86_64.rpm
c352e53bfd35cb08ef87102829ed2dcb
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/evolution-devel-2.6.0-49.66.3.x86_64.rpm
a4d5259610db7850b39e2b4ae2b7a00e
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/evolution-pilot-2.6.0-49.66.3.x86_64.rpm
50dae7030db765effccf36e23f112671
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/evolution-2.12.0-5.6.src.rpm
483dffff6981e43065de58916fc7faa0
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/evolution-2.8.2-9.src.rpm
ba7d8312622f37c7d05dba4e6d03a5e0
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/evolution-2.6.0-49.66.3.src.rpm
93827395e2d05427ea717d882f444da5
Novell Linux Desktop 9
http://support.novell.com/techcenter/psdb/d93d20ddb38276f9b6f334240fd20e16.html
SLE SDK 10 SP1
http://support.novell.com/techcenter/psdb/d93d20ddb38276f9b6f334240fd20e16.html
SUSE Linux Enterprise Desktop 10 SP1
http://support.novell.com/techcenter/psdb/d93d20ddb38276f9b6f334240fd20e16.html
ORIGINAL ADVISORY:
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00003.html
OTHER REFERENCES:
SA29057:
http://secunia.com/advisories/29057/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------