SUSE-SU-2021:0891-1: moderate: Security update for evolution-data-server
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Fri Mar 19 20:59:01 UTC 2021
SUSE Security Update: Security update for evolution-data-server
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0891-1
Rating: moderate
References: #1173910 #1174712 #1182882
Cross-References: CVE-2020-14928 CVE-2020-16117
CVSS scores:
CVE-2020-14928 (NVD) : 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2020-14928 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2020-16117 (NVD) : 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2020-16117 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP5
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for evolution-data-server fixes the following issues:
- Fix buffer overrun when parsing base64 data (bsc#1182882).
- CVE-2020-16117: Fix crash on malformed server response with minimal
capabilities (bsc#1174712).
- CVE-2020-14928: Response injection via STARTTLS in SMTP and POP3
(bsc#1173910).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP5:
zypper in -t patch SUSE-SLE-WE-12-SP5-2021-891=1
- SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-891=1
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64):
evolution-data-server-3.22.7-18.7.1
evolution-data-server-32bit-3.22.7-18.7.1
evolution-data-server-debuginfo-3.22.7-18.7.1
evolution-data-server-debuginfo-32bit-3.22.7-18.7.1
evolution-data-server-debugsource-3.22.7-18.7.1
libcamel-1_2-59-3.22.7-18.7.1
libcamel-1_2-59-32bit-3.22.7-18.7.1
libcamel-1_2-59-debuginfo-3.22.7-18.7.1
libcamel-1_2-59-debuginfo-32bit-3.22.7-18.7.1
libebackend-1_2-10-3.22.7-18.7.1
libebackend-1_2-10-32bit-3.22.7-18.7.1
libebackend-1_2-10-debuginfo-3.22.7-18.7.1
libebackend-1_2-10-debuginfo-32bit-3.22.7-18.7.1
libebook-1_2-16-3.22.7-18.7.1
libebook-1_2-16-32bit-3.22.7-18.7.1
libebook-1_2-16-debuginfo-3.22.7-18.7.1
libebook-1_2-16-debuginfo-32bit-3.22.7-18.7.1
libebook-contacts-1_2-2-3.22.7-18.7.1
libebook-contacts-1_2-2-32bit-3.22.7-18.7.1
libebook-contacts-1_2-2-debuginfo-3.22.7-18.7.1
libebook-contacts-1_2-2-debuginfo-32bit-3.22.7-18.7.1
libecal-1_2-19-3.22.7-18.7.1
libecal-1_2-19-32bit-3.22.7-18.7.1
libecal-1_2-19-debuginfo-3.22.7-18.7.1
libecal-1_2-19-debuginfo-32bit-3.22.7-18.7.1
libedata-book-1_2-25-3.22.7-18.7.1
libedata-book-1_2-25-32bit-3.22.7-18.7.1
libedata-book-1_2-25-debuginfo-3.22.7-18.7.1
libedata-book-1_2-25-debuginfo-32bit-3.22.7-18.7.1
libedata-cal-1_2-28-3.22.7-18.7.1
libedata-cal-1_2-28-32bit-3.22.7-18.7.1
libedata-cal-1_2-28-debuginfo-3.22.7-18.7.1
libedata-cal-1_2-28-debuginfo-32bit-3.22.7-18.7.1
libedataserver-1_2-22-3.22.7-18.7.1
libedataserver-1_2-22-32bit-3.22.7-18.7.1
libedataserver-1_2-22-debuginfo-3.22.7-18.7.1
libedataserver-1_2-22-debuginfo-32bit-3.22.7-18.7.1
libedataserverui-1_2-1-3.22.7-18.7.1
libedataserverui-1_2-1-debuginfo-3.22.7-18.7.1
- SUSE Linux Enterprise Workstation Extension 12-SP5 (noarch):
evolution-data-server-lang-3.22.7-18.7.1
- SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
evolution-data-server-debuginfo-3.22.7-18.7.1
evolution-data-server-debugsource-3.22.7-18.7.1
evolution-data-server-devel-3.22.7-18.7.1
typelib-1_0-EBook-1_2-3.22.7-18.7.1
typelib-1_0-EBookContacts-1_2-3.22.7-18.7.1
typelib-1_0-EDataServer-1_2-3.22.7-18.7.1
References:
https://www.suse.com/security/cve/CVE-2020-14928.html
https://www.suse.com/security/cve/CVE-2020-16117.html
https://bugzilla.suse.com/1173910
https://bugzilla.suse.com/1174712
https://bugzilla.suse.com/1182882
More information about the sle-updates
mailing list