[SECURITY] Fedora EPEL 5 Update: php53-mapi-7.1.8-1.el5

updates at fedoraproject.org updates at fedoraproject.org
Sun Feb 16 11:23:16 UTC 2014


--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2014-0410
2014-01-31 18:32:08
--------------------------------------------------------------------------------

Name        : php53-mapi
Product     : Fedora EPEL 5
Version     : 7.1.8
Release     : 1.el5
URL         : http://www.zarafa.com/
Summary     : The PHP MAPI extension by Zarafa
Description :
The php53-mapi package contains the PHP 5.3 MAPI extension to provide access
to Microsoft MAPI functions while using PHP. Although not all MAPI functions
and interfaces are supported so far, most functions have a PHP counterpart
in this extension. Using this PHP 5.3 MAPI extension, developers can create
e.g. webbased e-mail and calendaring systems and interfaces with existing
PHP projects, using the MAPI functions like a normal MAPI program.

--------------------------------------------------------------------------------
Update Information:

Zarafa Collaboration Platform 7.1.8 final [43801]
=================================================

Backend
-------

  * ZCP-7137: Several comments in default config files are incorrect 
  * ZCP-11974: ARM build compatibility with GCC > 4.4.4 patch 
  * ZCP-11973: Enhance logging of zarafa-dagent to display the same amount of information as zarafa-spooler 
  * ZCP-11972: Enhance IMAP messages log level prios 
  * ZCP-11746: ICalToMAPI.cpp missing break in switch icalerrno 
  * ZCP-11504: python-mapi doc has outdated info on charsets 
  * ZCP-11924: userscripts in Debian/Ubuntu do not include /etc/default/zarafa 
  * ZCP-11923: Double colons in Disposition-Notification-To: crash dagent 
  * ZCP-11922: support reading of S/MIME messages 
  * ZCP-11921: Priority is not set in received mail 
  * ZCP-11918: Make zarafa-stats faster on heavy loaded system 
  * ZCP-11890: Segfault Zarafa-Server 7.1.8 
  * ZCP-11883: zarafa-fsck crash when no first/lastname present, but suffix present which is longer than fullname! 
  * ZCP-11881: Add public restore bash script 
  * ZCP-11867: read flag not honored when specific header is used when delivering with dagent 
  * ZCP-10508: reference in the server.cfg to the example configs is incorrect
  * ZCP-10777: No error given when hooking an orphan to another server
  * ZCP-11135: Make the output of zarafa-stats machine-readable
  * ZCP-11186: Bricklevel backup should not refer to archive server or state
  * ZCP-11287: unclear error messages if multiserver setup is incorrect
  * ZCP-11536: zarafa-stats --users cuts off the year in date
  * ZCP-11538: Licensed crash during restart with 7.1.4
  * ZCP-11619: Check if zarafa-ads plugin/schemas are utf8 aware
  * ZCP-11696: Create coredump_enabled feature in all services (other than zarafa-server) as well
  * ZCP-11758: message-in-message has empty filename parameter in content-type header
  * ZCP-11790: Make uuencoded plugin for the dagent
  * ZCP-11799: Dagent plugin to censor specific words in emails
  * ZCP-11802: Remove C-style macro DEFINEMAPIPTR from common/mapi_ptr/mapi_object_ptr.h
  * ZCP-11819: zarafa-search crashes when the server is shutting down
  * ZCP-11829: Spelling errors in log formatting
  * ZCP-11832: zarafa-server segfaults on login by script run on zarafa http port
  * ZCP-11851: Broken rpm packages when upgrading from 7.0 to 7.1
  * ZCP-11855: zarafa-gateway is unable to create RTF text stream
  * ZCP-11807: gateway segfault on pop3 access 7.1.6/7.1.7
  * ZCP-11535: zarafa-search is unable to index specific pdf files


Archiver
--------

  * ZCP-11059: Zarafa-archiver throws error with empty premade database
  * ZCP-11808: zarafa-admin --unhook --type archive does not work.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1056767 - CVE-2014-0037 zarafa: unauthenticated denial of service flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=1056767
  [ 2 ] Bug #1059903 - CVE-2014-0079 zarafa: unauthenticated denial of service flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=1059903
--------------------------------------------------------------------------------

This update can be installed with the "yum" update programs.  Use
su -c 'yum update php53-mapi' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora EPEL GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the epel-package-announce mailing list