Описание
ELSA-2013-0515: openchange security, bug fix and enhancement update (MODERATE)
evolution-mapi [0.28.3-12]
- Add patch for RH bug #903241 (Double-free on message copy/move)
[0.28.3-11]
- Add patch for RH bug #902932 (Cannot connect with latest samba)
[0.28.3-10]
- Drop multilib by obsoleting evolution-mapi < 0.28.3-9 (RH bug #886914).
[0.28.3-9]
- Adapt to OpenChange 1.0 (RH bug #767678).
[0.28.3-8]
- Add patch for RH bug #680061 (crash while setting props).
openchange [1.0-4]
- Use current version (1.0-4) for a multilib obsolete (RH bug #881698).
[1.0-3]
- Add patch to be able to send large messages (RH bug #870405)
[1.0-2]
- Drop multilib by obsoleting openchange < 0.9 (RH bug #881698).
[1.0-1]
- Rebase to 1.0 using the rpm spec from Fedora 18.
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
evolution-mapi
0.28.3-12.el6
evolution-mapi-devel
0.28.3-12.el6
openchange
1.0-4.el6
openchange-client
1.0-4.el6
openchange-devel
1.0-4.el6
openchange-devel-docs
1.0-4.el6
Oracle Linux i686
evolution-mapi
0.28.3-12.el6
evolution-mapi-devel
0.28.3-12.el6
openchange
1.0-4.el6
openchange-client
1.0-4.el6
openchange-devel
1.0-4.el6
openchange-devel-docs
1.0-4.el6
Связанные CVE
Связанные уязвимости
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.