Skip to navigation

Security Advisory Moderate: evolution security update

Advisory: RHSA-2007:0158-2
Type: Security Advisory
Severity: Moderate
Issued on: 2007-05-03
Last updated on: 2007-05-03
Affected Products: RHEL Desktop Workstation (v. 5 client)
RHEL Optional Productivity Applications (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-1002

Details

Updated evolution packages that fix a format string bug are now available
for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Evolution is the GNOME collection of personal information management (PIM)
tools.

A format string bug was found in the way Evolution parsed the category field
in a memo. If a user tried to save and then view a carefully crafted memo,
arbitrary code may be executed as the user running Evolution. (CVE-2007-1002)

This flaw did not affect the versions of Evolution shipped with Red Hat
Enterprise Linux 2.1, 3, or 4.

All users of Evolution should upgrade to these updated packages, which
contain a backported patch which resolves this issue.

Red Hat would like to thank Ulf Härnhammar of Secunia Research for
reporting this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
evolution-2.8.0-33.0.1.el5.src.rpm
File outdated by:  RHBA-2008:0997
    MD5: 0cb44e29c3da6579a62e0c24851f5d4c
 
IA-32:
evolution-devel-2.8.0-33.0.1.el5.i386.rpm
File outdated by:  RHBA-2009:1260
    MD5: a2d12fab974bea9d3691fcad87ab228f
 
x86_64:
evolution-devel-2.8.0-33.0.1.el5.i386.rpm
File outdated by:  RHBA-2009:1260
    MD5: a2d12fab974bea9d3691fcad87ab228f
evolution-devel-2.8.0-33.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2009:1260
    MD5: 18899bef45c3e70811d7a829379151df
 
RHEL Optional Productivity Applications (v. 5 server)

SRPMS:
evolution-2.8.0-33.0.1.el5.src.rpm
File outdated by:  RHBA-2008:0997
    MD5: 0cb44e29c3da6579a62e0c24851f5d4c
 
IA-32:
evolution-2.8.0-33.0.1.el5.i386.rpm
File outdated by:  RHBA-2008:0997
    MD5: ba5c46a0f4e89c9788ce6bf228ed27f9
evolution-devel-2.8.0-33.0.1.el5.i386.rpm
File outdated by:  RHBA-2008:0997
    MD5: a2d12fab974bea9d3691fcad87ab228f
 
x86_64:
evolution-2.8.0-33.0.1.el5.i386.rpm
File outdated by:  RHBA-2008:0997
    MD5: ba5c46a0f4e89c9788ce6bf228ed27f9
evolution-2.8.0-33.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2008:0997
    MD5: 89344bbefa9f5f938cdf9dfbd997fc61
evolution-devel-2.8.0-33.0.1.el5.i386.rpm
File outdated by:  RHBA-2008:0997
    MD5: a2d12fab974bea9d3691fcad87ab228f
evolution-devel-2.8.0-33.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2008:0997
    MD5: 18899bef45c3e70811d7a829379151df
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
evolution-2.8.0-33.0.1.el5.src.rpm
File outdated by:  RHBA-2008:0997
    MD5: 0cb44e29c3da6579a62e0c24851f5d4c
 
IA-32:
evolution-2.8.0-33.0.1.el5.i386.rpm
File outdated by:  RHBA-2009:1260
    MD5: ba5c46a0f4e89c9788ce6bf228ed27f9
 
x86_64:
evolution-2.8.0-33.0.1.el5.i386.rpm
File outdated by:  RHBA-2009:1260
    MD5: ba5c46a0f4e89c9788ce6bf228ed27f9
evolution-2.8.0-33.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2009:1260
    MD5: 89344bbefa9f5f938cdf9dfbd997fc61
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

231478 - CVE-2007-1002 evolution format string flaw


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/