Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-39361

Опубликовано: 22 авг. 2021
Источник: debian

Описание

In GNOME evolution-rss through 0.3.96, network-soup.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
evolution-rssremovedpackage
evolution-rssno-dsabullseyepackage
evolution-rssno-dsabusterpackage
evolution-rsspostponedstretchpackage

Примечания

  • https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/

  • https://gitlab.gnome.org/GNOME/evolution-rss/-/issues/11

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 4 лет назад

In GNOME evolution-rss through 0.3.96, network-soup.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.

CVSS3: 5.9
nvd
больше 4 лет назад

In GNOME evolution-rss through 0.3.96, network-soup.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.

github
больше 3 лет назад

In GNOME evolution-rss through 0.3.96, network-soup.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.