Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0516

Опубликовано: 22 фев. 2013
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2013-0516: evolution security and bug fix update (LOW)

[2.28.3-30.el6]

  • Update patch for RH bug #707526 (Prints QP-encoded email encoded)

[2.28.3-29.el6]

  • Add patch for RH bug #890642 (Crash due to implicit function declarations)

[2.28.3-28.el6]

  • Add patch for RH bug #885558 (CVE 2011-3201).

[2.28.3-27.el6]

  • Add patch for RH bug #805239 (calendar alarm notifications).

[2.28.3-26.el6]

  • Add patch for RH bug #707526 (contact_list_editor_render_destination)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

evolution

2.28.3-30.el6

evolution-conduits

2.28.3-30.el6

evolution-devel

2.28.3-30.el6

evolution-help

2.28.3-30.el6

evolution-perl

2.28.3-30.el6

evolution-pst

2.28.3-30.el6

evolution-spamassassin

2.28.3-30.el6

Oracle Linux i686

evolution

2.28.3-30.el6

evolution-conduits

2.28.3-30.el6

evolution-devel

2.28.3-30.el6

evolution-help

2.28.3-30.el6

evolution-perl

2.28.3-30.el6

evolution-pst

2.28.3-30.el6

evolution-spamassassin

2.28.3-30.el6

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.

redhat
около 14 лет назад

GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.

nvd
больше 12 лет назад

GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.

debian
больше 12 лет назад

GNOME Evolution before 3.2.3 allows user-assisted remote attackers to ...

github
больше 3 лет назад

GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.