Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0515

Опубликовано: 27 фев. 2013
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2013-0515: openchange security, bug fix and enhancement update (MODERATE)

evolution-mapi [0.28.3-12]

  • Add patch for RH bug #903241 (Double-free on message copy/move)

[0.28.3-11]

  • Add patch for RH bug #902932 (Cannot connect with latest samba)

[0.28.3-10]

  • Drop multilib by obsoleting evolution-mapi < 0.28.3-9 (RH bug #886914).

[0.28.3-9]

  • Adapt to OpenChange 1.0 (RH bug #767678).

[0.28.3-8]

  • Add patch for RH bug #680061 (crash while setting props).

openchange [1.0-4]

  • Use current version (1.0-4) for a multilib obsolete (RH bug #881698).

[1.0-3]

  • Add patch to be able to send large messages (RH bug #870405)

[1.0-2]

  • Drop multilib by obsoleting openchange < 0.9 (RH bug #881698).

[1.0-1]

  • Rebase to 1.0 using the rpm spec from Fedora 18.

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

evolution-mapi

0.28.3-12.el6

evolution-mapi-devel

0.28.3-12.el6

openchange

1.0-4.el6

openchange-client

1.0-4.el6

openchange-devel

1.0-4.el6

openchange-devel-docs

1.0-4.el6

Oracle Linux i686

evolution-mapi

0.28.3-12.el6

evolution-mapi-devel

0.28.3-12.el6

openchange

1.0-4.el6

openchange-client

1.0-4.el6

openchange-devel

1.0-4.el6

openchange-devel-docs

1.0-4.el6

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

redhat
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

nvd
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

debian
больше 13 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...

github
больше 3 лет назад

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.