Updated evolution-data-server packages fix security vulnerabilities
Publication date: 28 Aug 2020Modification date: 28 Aug 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2020-14928 , CVE-2020-16117
Description
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection". (CVE-2020-14928) In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server. (CVE-2020-16117)
References
- https://bugs.mageia.org/show_bug.cgi?id=26962
- https://lists.debian.org/debian-security-announce/2020/msg00131.html
- https://www.debian.org/security/2020/dsa-4725
- https://www.debian.org/lts/security/2020/dla-2281
- https://www.debian.org/lts/security/2020/dla-2309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14928
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16117
SRPMS
7/core
- evolution-data-server-3.32.2-1.2.mga7