Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVA-2008:186 ] evolution

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1228168810-14940-4926

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Advisory MDVA-2008:186

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : evolution

Date : December 1, 2008

Affected: 2009.0

_______________________________________________________________________

 

Problem Description:

 

Outgoing mails sent through the Evolution Exchange plugin were not

always sent properly. Spell checking was not working properly when

two different languages were enabled, causing all words to be detected

as mistyped. Those bugs are fixed by this package updates, as well

as massive performance improvements in IMAP handling, additional

translations and many bug fixes from GNOME 2.24.2.

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2009.0:

24870adcad72ad28ea9f247d542ae668 2009.0/i586/evolution-2.24.2-1.1mdv2009.0.i586.rpm

8d757f41564efc3674ac367473e82817 2009.0/i586/evolution-data-server-2.24.2-2.1mdv2009.0.i586.rpm

49ae54314c97fba1923b280f31d57e5b 2009.0/i586/evolution-devel-2.24.2-1.1mdv2009.0.i586.rpm

d7f3a62f17bb7665ef5fb5caca612f8e 2009.0/i586/evolution-exchange-2.24.2-1.1mdv2009.0.i586.rpm

5330344a627946acad200b1a2b1b7ec8 2009.0/i586/evolution-mono-2.24.2-1.1mdv2009.0.i586.rpm

210acbe6ff0989edfb3de0bfd584e3c0 2009.0/i586/evolution-pilot-2.24.2-1.1mdv2009.0.i586.rpm

56cfc7767e5cf77cc6ab7b8ef50871cb 2009.0/i586/gtkhtml-3.14-3.24.2-1.1mdv2009.0.i586.rpm

4ebb0402cbea6f46c2a9db61a07fa294 2009.0/i586/libcamel14-2.24.2-2.1mdv2009.0.i586.rpm

12524863f916f546c37f380eebb4c3f1 2009.0/i586/libebackend0-2.24.2-2.1mdv2009.0.i586.rpm

361e282f8bec983981d6fb2786055684 2009.0/i586/libebook9-2.24.2-2.1mdv2009.0.i586.rpm

cf4ac496debd97a941da061b4f6fbb7d 2009.0/i586/libecal7-2.24.2-2.1mdv2009.0.i586.rpm

9d941a04a2ce607b557bbd73905f9d3d 2009.0/i586/libedata-book2-2.24.2-2.1mdv2009.0.i586.rpm

2cfd9770f954a13cb36fb55da68db9de 2009.0/i586/libedata-cal6-2.24.2-2.1mdv2009.0.i586.rpm

8489fdb2b1394fe77a7f0dab6e9a582b 2009.0/i586/libedataserver11-2.24.2-2.1mdv2009.0.i586.rpm

98dcf22104acf7c95ecb8748dc3256cf 2009.0/i586/libedataserver-devel-2.24.2-2.1mdv2009.0.i586.rpm

a522e67bcb6ff0d11ae26778add68d5a 2009.0/i586/libedataserverui8-2.24.2-2.1mdv2009.0.i586.rpm

68818fdb18befb013243e85cec32e42e 2009.0/i586/libegroupwise13-2.24.2-2.1mdv2009.0.i586.rpm

a89b7fd74b001bdef668d438edc80566 2009.0/i586/libexchange-storage3-2.24.2-2.1mdv2009.0.i586.rpm

ea573016cb5a3a266e090686031ae42a 2009.0/i586/libgdata1-2.24.2-2.1mdv2009.0.i586.rpm

3f18103eb5f5afdb23c8b308b3e6809d 2009.0/i586/libgtkhtml-3.14_19-3.24.2-1.1mdv2009.0.i586.rpm

6a15344e6b259f4b41f6c1687dda69a4 2009.0/i586/libgtkhtml-3.14-devel-3.24.2-1.1mdv2009.0.i586.rpm

0d5df7d3cc801c2cede173c6965e8b34 2009.0/SRPMS/evolution-2.24.2-1.1mdv2009.0.src.rpm

ae700f725cc77a7dc2b0ed2a6856506e 2009.0/SRPMS/evolution-data-server-2.24.2-2.1mdv2009.0.src.rpm

ca6369a3aca7c452f21cf382874ee6f2 2009.0/SRPMS/evolution-exchange-2.24.2-1.1mdv2009.0.src.rpm

8850b569b4a823a6118d2efde9310fb0 2009.0/SRPMS/gtkhtml-3.14-3.24.2-1.1mdv2009.0.src.rpm

 

Mandriva Linux 2009.0/X86_64:

4b2200e515289970a5a7374e502f91e1 2009.0/x86_64/evolution-2.24.2-1.1mdv2009.0.x86_64.rpm

0dd2fc89c57e3672e566ecb6db401987 2009.0/x86_64/evolution-data-server-2.24.2-2.1mdv2009.0.x86_64.rpm

501352c015eb119ff1804c95766aa1c7 2009.0/x86_64/evolution-devel-2.24.2-1.1mdv2009.0.x86_64.rpm

91065a95acec9184dc14835526b549e9 2009.0/x86_64/evolution-exchange-2.24.2-1.1mdv2009.0.x86_64.rpm

2539113ee8f58da16a8ff991373aaa50 2009.0/x86_64/evolution-mono-2.24.2-1.1mdv2009.0.x86_64.rpm

5c04bac006ad10e515cf952526c816f7 2009.0/x86_64/evolution-pilot-2.24.2-1.1mdv2009.0.x86_64.rpm

9e1933520a174b847c478d84b715959c 2009.0/x86_64/gtkhtml-3.14-3.24.2-1.1mdv2009.0.x86_64.rpm

ede3d0f536330ebf42f8312a7a7c6c54 2009.0/x86_64/lib64camel14-2.24.2-2.1mdv2009.0.x86_64.rpm

52cfdbf5f5424f81b3c573b005a4d64d 2009.0/x86_64/lib64ebackend0-2.24.2-2.1mdv2009.0.x86_64.rpm

7447a7498531d988d2e32eefcb4c1015 2009.0/x86_64/lib64ebook9-2.24.2-2.1mdv2009.0.x86_64.rpm

06167772bcfd58e77ac1f6787bbf5b01 2009.0/x86_64/lib64ecal7-2.24.2-2.1mdv2009.0.x86_64.rpm

550140336c9a26b5243e024190fc950c 2009.0/x86_64/lib64edata-book2-2.24.2-2.1mdv2009.0.x86_64.rpm

37a4a905597b03708e7d12304c6ca9c3 2009.0/x86_64/lib64edata-cal6-2.24.2-2.1mdv2009.0.x86_64.rpm

036dbcd607b19bcffee57b45b02c693b 2009.0/x86_64/lib64edataserver11-2.24.2-2.1mdv2009.0.x86_64.rpm

b3c59a2ccb42d6c77c15388c4537497a 2009.0/x86_64/lib64edataserver-devel-2.24.2-2.1mdv2009.0.x86_64.rpm

f5ea26919dc608c8ec0110db4a36f43e 2009.0/x86_64/lib64edataserverui8-2.24.2-2.1mdv2009.0.x86_64.rpm

2970f9e978ca6920d29182185bb70241 2009.0/x86_64/lib64egroupwise13-2.24.2-2.1mdv2009.0.x86_64.rpm

302b9e8ff03cb956db4de9bd091d6a7b 2009.0/x86_64/lib64exchange-storage3-2.24.2-2.1mdv2009.0.x86_64.rpm

78f060396dc19a0e1b268f6ca058b106 2009.0/x86_64/lib64gdata1-2.24.2-2.1mdv2009.0.x86_64.rpm

c16c384592233fc35c89ef739aac35e4 2009.0/x86_64/lib64gtkhtml-3.14_19-3.24.2-1.1mdv2009.0.x86_64.rpm

657475faf1b96b31ba5accce65b9d504 2009.0/x86_64/lib64gtkhtml-3.14-devel-3.24.2-1.1mdv2009.0.x86_64.rpm

0d5df7d3cc801c2cede173c6965e8b34 2009.0/SRPMS/evolution-2.24.2-1.1mdv2009.0.src.rpm

ae700f725cc77a7dc2b0ed2a6856506e 2009.0/SRPMS/evolution-data-server-2.24.2-2.1mdv2009.0.src.rpm

ca6369a3aca7c452f21cf382874ee6f2 2009.0/SRPMS/evolution-exchange-2.24.2-1.1mdv2009.0.src.rpm

8850b569b4a823a6118d2efde9310fb0 2009.0/SRPMS/gtkhtml-3.14-3.24.2-1.1mdv2009.0.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFJNDS0mqjQ0CJFipgRApg0AJ4zkhGc6N7HMUikJExebVVRA/IX0gCeNPg/

rEyXzURgcFk5uZonGpWXP4U=

=QnUf

-----END PGP SIGNATURE-----

 

 

------------=_1228168810-14940-4926

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1228168810-14940-4926--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×