SUSE: 2019:1266-1 moderate: evolution
Summary
This update for evolution fixes the following issues: Security issue fixed: - CVE-2018-15587: Fixed an issue with spoofed pgp signatures by using specially crafted emails (bsc#1125230). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 15: zypper in -t patch SUSE-SLE-Product-WE-15-2019-1266=1 - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-1266=1 Package List: - SUSE Linux Enterprise Workstation Extension 15 (x86_64): evolution-3.26.6-4.3.1 evolution-debuginfo-3.26.6-4.3.1 evolution-debugsource-3.26.6-4.3.1 evolution-devel-3.26.6-4.3.1 evolution-plugin-bogofilter-3.26.6-4.3.1 evolution-plugin-bogofilter-debuginfo-3.26.6-4.3.1 evolution-plugin-pst-import-3.26.6-4.3.1 evolution-plugin-pst-import-debuginfo-3.26.6-4.3.1 evolution-plugin-spamassassin-3.26.6-4.3.1 evolution-plugin-spamassassin-debuginfo-3.26.6-4.3.1 - SUSE Linux Enterprise Workstation Extension 15 (noarch): evolution-lang-3.26.6-4.3.1 - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64): evolution-debuginfo-3.26.6-4.3.1 evolution-debugsource-3.26.6-4.3.1 glade-catalog-evolution-3.26.6-4.3.1 glade-catalog-evolution-debuginfo-3.26.6-4.3.1
References
#1125230
Cross- CVE-2018-15587
Affected Products:
SUSE Linux Enterprise Workstation Extension 15
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
https://www.suse.com/security/cve/CVE-2018-15587.html
https://bugzilla.suse.com/1125230