Bug 1862125 (CVE-2020-16117)

Summary: CVE-2020-16117 evolution-data-server: NULL pointer dereference related to imapx_free_capability and imapx_connect_to_server
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: caillon+fedoraproject, john.j5live, mbarnes, mcrha, rhughes, rstrode
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: evolution-data-server 3.35.91 Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference flaw was found in the GNOME evolution-data-server when a mail client parses invalid messages from a malicious server. This flaw allows an attacker who controls a mail server the ability to crash the mail clients. The highest threat from this vulnerability is to system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-05-18 14:35:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1862127, 1862402, 1862403    
Bug Blocks: 1862128    

Description Pedro Sampaio 2020-07-30 14:03:23 UTC
In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server.

Upstream patch:

https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/2cc39592b532cf0dc994fd3694b8e6bf924c9ab5
https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/627c3cdbfd077e59aa288c85ff8272950577f1d7

Upstream issue:

https://gitlab.gnome.org/GNOME/evolution-data-server/-/issues/189

Comment 1 Pedro Sampaio 2020-07-30 14:03:57 UTC
Created evolution-data-server tracking bugs for this issue:

Affects: fedora-all [bug 1862127]

Comment 2 Milan Crha 2020-07-30 15:01:15 UTC
(In reply to Pedro Sampaio from comment #1)
> Affects: fedora-all [bug 1862127]

This is not accurate, the Fedora 32 contains evolution-data-server 3.36.4, which does contain the fix (as it's after 3.35.91 and from the same base branch). Similarly for Fedora 33 (rawhide) with 3.37.3 at the moment. The only affected is Fedora 31, with evolution-data-server 3.34.4.

Comment 5 Riccardo Schirone 2020-07-31 11:06:43 UTC
Statement:

The flaw requires a malicious server and it can at most make the client application crash, without additional damage to the client's data or system.

Comment 8 Product Security DevOps Team 2021-05-18 14:35:11 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-16117

Comment 9 errata-xmlrpc 2021-05-18 14:45:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1752 https://access.redhat.com/errata/RHSA-2021:1752