Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2020:4649

Опубликовано: 03 нояб. 2020
Источник: rocky
Оценка: Low

Описание

Low: evolution security and bug fix update

Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.

The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.

OpenChange provides libraries to access Microsoft Exchange servers using native protocols.

Security Fix(es):

  • evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bogofilterx86_642.el8bogofilter-1.2.5-2.el8.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.3
redhat
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.9
nvd
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."

CVSS3: 5.9
debian
почти 5 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering is ...

github
около 3 лет назад

evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."