[Evolution] evolution stable update for CVE-2008-1108 CVE-2008-1109

Nico Golde nion at debian.org
Sun Feb 1 12:39:53 UTC 2009


Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for evolution some time ago.

CVE-2008-1108[0]:
| Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is
| disabled, allows remote attackers to execute arbitrary code via a long
| timezone string in an iCalendar attachment.

CVE-2008-1109[1]:
| Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted
| remote attackers to execute arbitrary code via a long DESCRIPTION
| property in an iCalendar attachment, which is not properly handled
| during a reply in the calendar view (aka the Calendars window).

Additionally there is 
http://bugzilla.gnome.org/show_bug.cgi?id=535459 which has 
no CVE id yet. It would be also nice to get this fixed as 
well.

Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable. It does
not warrant a DSA.

However it would be nice if this could get fixed via a regular point update[2].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109
[2] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-evolution-maintainers/attachments/20090201/5c815274/attachment.pgp 


More information about the Pkg-evolution-maintainers mailing list