SUSE: 2019:1266-2 moderate: evolution
Summary
This update for evolution fixes the following issues: Security issue fixed: - CVE-2018-15587: Fixed an issue with spoofed pgp signatures by using specially crafted emails (bsc#1125230). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 15-SP1: zypper in -t patch SUSE-SLE-Product-WE-15-SP1-2019-1266=1 - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1266=1 Package List: - SUSE Linux Enterprise Workstation Extension 15-SP1 (noarch): evolution-lang-3.26.6-4.3.1 - SUSE Linux Enterprise Workstation Extension 15-SP1 (x86_64): evolution-3.26.6-4.3.1 evolution-debuginfo-3.26.6-4.3.1 evolution-debugsource-3.26.6-4.3.1 evolution-devel-3.26.6-4.3.1 evolution-plugin-bogofilter-3.26.6-4.3.1 evolution-plugin-bogofilter-debuginfo-3.26.6-4.3.1 evolution-plugin-pst-import-3.26.6-4.3.1 evolution-plugin-pst-import-debuginfo-3.26.6-4.3.1 evolution-plugin-spamassassin-3.26.6-4.3.1 evolution-plugin-spamassassin-debuginfo-3.26.6-4.3.1 - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (aarch64 ppc64le s390x x86_64): evolution-debuginfo-3.26.6-4.3.1 evolution-debugsource-3.26.6-4.3.1 glade-catalog-evolution-3.26.6-4.3.1 glade-catalog-evolution-debuginfo-3.26.6-4.3.1
References
#1125230
Cross- CVE-2018-15587
Affected Products:
SUSE Linux Enterprise Workstation Extension 15-SP1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
https://www.suse.com/security/cve/CVE-2018-15587.html
https://bugzilla.suse.com/1125230