Scientific Linux Security Update : evolution on SL6.x i386/x86_64

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

A flaw was found in the way Evolution selected GnuPG public keys when
encrypting emails. This could result in emails being encrypted with
public keys other than the one belonging to the intended recipient.
(CVE-2013-4166)

The Evolution packages have been upgraded to upstream version 2.32.3,
which provides a number of bug fixes and enhancements over the
previous version. These changes include implementation of Gnome XDG
Config Folders, and support for Exchange Web Services (EWS) protocol
to connect to Microsoft Exchange servers. EWS support has been added
as a part of the evolution-exchange packages.

The gtkhtml3 packages have been upgraded to upstream version 2.32.2,
which provides a number of bug fixes and enhancements over the
previous version.

The libgdata packages have been upgraded to upstream version 0.6.4,
which provides a number of bug fixes and enhancements over the
previous version.

This update also fixes the following bug :

- The Exchange Calendar could not fetch the 'Free' and
'Busy' information for meeting attendees when using
Microsoft Exchange 2010 servers, and this information
thus could not be displayed. This happened because
Microsoft Exchange 2010 servers use more strict rules
for 'Free' and 'Busy' information fetching. With this
update, the respective code in the openchange packages
has been modified so the 'Free' and 'Busy' information
fetching now complies with the fetching rules on
Microsoft Exchange 2010 servers. The 'Free' and 'Busy'
information can now be displayed as expected in the
Exchange Calendar.

All running instances of Evolution must be restarted for this update
to take effect.

See also :

http://www.nessus.org/u?966a77ce

Solution :

Update the affected packages.

Risk factor :

High

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 71298 ()

Bugtraq ID:

CVE ID: CVE-2013-4166