Advisories ยป MGASA-2020-0351

Updated evolution-data-server packages fix security vulnerabilities

Publication date: 28 Aug 2020
Modification date: 28 Aug 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2020-14928 , CVE-2020-16117

Description

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue
that affects SMTP and POP3. When a server sends a "begin TLS" response,
eds reads additional data and evaluates it in a TLS context, aka
"response injection". (CVE-2020-14928)

In GNOME evolution-data-server before 3.35.91, a malicious server can crash
the mail client with a NULL pointer dereference by sending an invalid
(e.g., minimal) CAPABILITY line on a connection attempt.
This is related to imapx_free_capability and imapx_connect_to_server.
(CVE-2020-16117)
                

References

SRPMS

7/core