Lucene search

K
centosCentOS ProjectCESA-2005:238
HistoryMay 19, 2005 - 6:33 p.m.

evolution security update

2005-05-1918:33:00
CentOS Project
lists.centos.org
48

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.005 Low

EPSS

Percentile

76.7%

CentOS Errata and Security Advisory CESA-2005:238

Evolution is the GNOME collection of personal information management (PIM)
tools. Evolution includes a mailer, calendar, contact manager, and
communication facility. The tools which make up Evolution are tightly
integrated with one another and act as a seamless personal information
management tool.

A bug was found in Evolution’s helper program camel-lock-helper. This
bug could allow a local attacker to gain root privileges if
camel-lock-helper has been built to execute with elevated privileges. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-0102 to this issue. On Red Hat Enterprise Linux,
camel-lock-helper is not built to execute with elevated privileges by
default. Please note however that if users have rebuilt Evolution from the
source RPM, as the root user, camel-lock-helper may be given elevated
privileges.

Additionally, these updated packages address the following issues:

– If evolution ran during a GNOME session, the evolution-wombat process
did not exit when the user logged out of the desktop.

– For folders marked for Offline Synchronization: if a user moved a
message from a Local Folder to an IMAP folder while in
Offline mode, the message was not present in either folder after
returning to Online mode.

This update fixes this problem. Email messages that have been lost
this way may still be present in the following path:

~/evolution/<NAME_OF_MAIL_STORE>/
<path-to-folder-via-subfolder-directories>/
<temporary-uid-of-message>

If this bug has affected you it may be possible to recover data by
examining the contents of this directory.

All users of evolution should upgrade to these updated packages, which
resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-May/073877.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073878.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073888.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073889.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073897.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073898.html

Affected packages:
evolution
evolution-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:238

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.005 Low

EPSS

Percentile

76.7%