exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 29317

Secunia Security Advisory 29317
Posted Mar 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, suse
SHA-256 | 07b2cf758cad31b5b1f8b7889eb5f22591c3e1970ef3d624ce3b059750cd608c

Secunia Security Advisory 29317

Change Mirror Download
----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
SUSE update for evolution

SECUNIA ADVISORY ID:
SA29317

VERIFY ADVISORY:
http://secunia.com/advisories/29317/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

OPERATING SYSTEM:
SUSE Linux 10.1
http://secunia.com/product/10796/
openSUSE 10.2
http://secunia.com/product/13375/
openSUSE 10.3
http://secunia.com/product/16124/

DESCRIPTION:
SUSE has issued an update for evolution. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

For more information:
SA29057

SOLUTION:
Apply updated packages.

x86 Platform:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/evolution-2.12.0-5.6.i586.rpm
4a13b961952e7913af466ef1738c0196

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/evolution-devel-2.12.0-5.6.i586.rpm
2ecaf3f223841665df554aa8e20d5978

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/evolution-pilot-2.12.0-5.6.i586.rpm
d06a664885565b04774d5d3c2afb84f5

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/evolution-2.8.2-9.i586.rpm
c7949a1af35d7abdb7a36fd7fc90607b

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/evolution-devel-2.8.2-9.i586.rpm
eadabc26ef71fbb91c498f202196e640

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/evolution-pilot-2.8.2-9.i586.rpm
b8a8b80039aa8f1641c0103bb04f75a0

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/evolution-2.6.0-49.66.3.i586.rpm
cc40ee93e3f2043a25dff22e62bc4e4e

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/evolution-devel-2.6.0-49.66.3.i586.rpm
b7fb5fec304a0e623be28233a66525ad

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/evolution-pilot-2.6.0-49.66.3.i586.rpm
d2833e3948641af99a9e76026da6e8da

Power PC Platform:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/evolution-2.12.0-5.6.ppc.rpm
a6e9d56b825c7809bc62a87f546bdb50

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/evolution-devel-2.12.0-5.6.ppc.rpm
772ce1adbb46a5ba5f703bf4dcfbd49e

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/evolution-pilot-2.12.0-5.6.ppc.rpm
946a9756bab858d4242736e055009173

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/evolution-2.8.2-9.ppc.rpm
fa5ed56ee0d3a6718015bf722e34ff6f

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/evolution-devel-2.8.2-9.ppc.rpm
91565615e83f40a40d435e9edcca2a63

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/evolution-pilot-2.8.2-9.ppc.rpm
443a51070cdb147473536fec3b704533

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/evolution-2.6.0-49.66.3.ppc.rpm
8b0beec2e2ecad7969fc91aa12c963d2

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/evolution-devel-2.6.0-49.66.3.ppc.rpm
46706e204d46f01026af35b861c101a6

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/evolution-pilot-2.6.0-49.66.3.ppc.rpm
0c946a3533d2a55812f0fd60886e097f

x86-64 Platform:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/evolution-2.12.0-5.6.x86_64.rpm
6c9f98241bf08edc4a77d52c4232ed60

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/evolution-devel-2.12.0-5.6.x86_64.rpm
bab5d0660dbb9076bd865ccae25bc68d

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/evolution-pilot-2.12.0-5.6.x86_64.rpm
44778c1ea873e4e54021ce3588f406de

openSUSE 10.2:

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/evolution-2.8.2-9.x86_64.rpm
8ac28a5b6875266d281400060867b45f

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/evolution-devel-2.8.2-9.x86_64.rpm
970d89a3ae7574334586a6b9388e1073

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/evolution-pilot-2.8.2-9.x86_64.rpm
6ffb4564be38436e91a0b10b908ff18d

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/evolution-2.6.0-49.66.3.x86_64.rpm
c352e53bfd35cb08ef87102829ed2dcb

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/evolution-devel-2.6.0-49.66.3.x86_64.rpm
a4d5259610db7850b39e2b4ae2b7a00e

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/evolution-pilot-2.6.0-49.66.3.x86_64.rpm
50dae7030db765effccf36e23f112671

Sources:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/evolution-2.12.0-5.6.src.rpm
483dffff6981e43065de58916fc7faa0

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/evolution-2.8.2-9.src.rpm
ba7d8312622f37c7d05dba4e6d03a5e0

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/evolution-2.6.0-49.66.3.src.rpm
93827395e2d05427ea717d882f444da5

Novell Linux Desktop 9

http://support.novell.com/techcenter/psdb/d93d20ddb38276f9b6f334240fd20e16.html

SLE SDK 10 SP1

http://support.novell.com/techcenter/psdb/d93d20ddb38276f9b6f334240fd20e16.html

SUSE Linux Enterprise Desktop 10 SP1

http://support.novell.com/techcenter/psdb/d93d20ddb38276f9b6f334240fd20e16.html

ORIGINAL ADVISORY:
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00003.html

OTHER REFERENCES:
SA29057:
http://secunia.com/advisories/29057/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close