Mageia 2020-0351: evolution-data-server security update
Summary
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue
that affects SMTP and POP3. When a server sends a "begin TLS" response,
eds reads additional data and evaluates it in a TLS context, aka
"response injection". (CVE-2020-14928)
In GNOME evolution-data-server before 3.35.91, a malicious server can crash
the mail client with a NULL pointer dereference by sending an invalid
(e.g., minimal) CAPABILITY line on a connection attempt.
This is related to imapx_free_capability and imapx_connect_to_server.
(CVE-2020-16117)
References
- https://bugs.mageia.org/show_bug.cgi?id=26962
- https://lists.debian.org/debian-security-announce/2020/msg00131.html
- https://www.debian.org/security/2020/dsa-4725
- https://www.debian.org/lts/security/2020/dla-2281
- https://www.debian.org/lts/security/2020/dla-2309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14928
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16117
Resolution
MGASA-2020-0351 - Updated evolution-data-server packages fix security vulnerabilities
SRPMS
- 7/core/evolution-data-server-3.32.2-1.2.mga7