CVE-2020-14928

Priority
Description
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue
that affects SMTP and POP3. When a server sends a "begin TLS" response, eds
reads additional data and evaluates it in a TLS context, aka "response
injection."
Assigned-to
mdeslaur
Notes
Package
Upstream:released (3.36.4-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (3.18.5-1ubuntu1.3)
Ubuntu 18.04 LTS (Bionic Beaver):released (3.28.5-0ubuntu0.18.04.3)
Ubuntu 20.04 LTS (Focal Fossa):released (3.36.3-0ubuntu1.1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (3.36.4-1)
Patches:
Upstream:https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/f404f33fb01b23903c2bbb16791c7907e457fbac
Upstream:https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/b74b765188d96803814acf69a510a7160d9ee6c5
More Information

Updated: 2020-07-30 08:26:09 UTC (commit dd36f14d21577f24d69b52e860f40106ba49ea35)