vulnerability

CentOS Linux: CVE-2020-16117: Low: evolution security, bug fix, and enhancement update (CESA-2021:1752)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Jul 29, 2020
Added
Jun 1, 2021
Modified
May 25, 2023

Description

In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server.

Solutions

centos-upgrade-evolutioncentos-upgrade-evolution-bogofiltercentos-upgrade-evolution-bogofilter-debuginfocentos-upgrade-evolution-data-servercentos-upgrade-evolution-data-server-debuginfocentos-upgrade-evolution-data-server-debugsourcecentos-upgrade-evolution-data-server-develcentos-upgrade-evolution-data-server-langpackscentos-upgrade-evolution-data-server-tests-debuginfocentos-upgrade-evolution-debuginfocentos-upgrade-evolution-debugsourcecentos-upgrade-evolution-ewscentos-upgrade-evolution-ews-debuginfocentos-upgrade-evolution-ews-debugsourcecentos-upgrade-evolution-ews-langpackscentos-upgrade-evolution-helpcentos-upgrade-evolution-langpackscentos-upgrade-evolution-pstcentos-upgrade-evolution-pst-debuginfocentos-upgrade-evolution-spamassassincentos-upgrade-evolution-spamassassin-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.