7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.005 Low
EPSS
Percentile
76.8%
CentOS Errata and Security Advisory CESA-2005:238
Evolution is the GNOME collection of personal information management (PIM)
tools. Evolution includes a mailer, calendar, contact manager, and
communication facility. The tools which make up Evolution are tightly
integrated with one another and act as a seamless personal information
management tool.
A bug was found in Evolution’s helper program camel-lock-helper. This
bug could allow a local attacker to gain root privileges if
camel-lock-helper has been built to execute with elevated privileges. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-0102 to this issue. On Red Hat Enterprise Linux,
camel-lock-helper is not built to execute with elevated privileges by
default. Please note however that if users have rebuilt Evolution from the
source RPM, as the root user, camel-lock-helper may be given elevated
privileges.
Additionally, these updated packages address the following issues:
– If evolution ran during a GNOME session, the evolution-wombat process
did not exit when the user logged out of the desktop.
– For folders marked for Offline Synchronization: if a user moved a
message from a Local Folder to an IMAP folder while in
Offline mode, the message was not present in either folder after
returning to Online mode.
This update fixes this problem. Email messages that have been lost
this way may still be present in the following path:
~/evolution/<NAME_OF_MAIL_STORE>/
<path-to-folder-via-subfolder-directories>/
<temporary-uid-of-message>
If this bug has affected you it may be possible to recover data by
examining the contents of this directory.
All users of evolution should upgrade to these updated packages, which
resolve these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-May/073877.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073878.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073888.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073889.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073897.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073898.html
Affected packages:
evolution
evolution-devel
Upstream details at:
https://access.redhat.com/errata/RHSA-2005:238
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | ia64 | evolution | < 1.4.5-14 | evolution-1.4.5-14.ia64.rpm |
CentOS | 3 | ia64 | evolution-devel | < 1.4.5-14 | evolution-devel-1.4.5-14.ia64.rpm |
CentOS | 3 | s390 | evolution | < 1.4.5-14 | evolution-1.4.5-14.s390.rpm |
CentOS | 3 | s390 | evolution-devel | < 1.4.5-14 | evolution-devel-1.4.5-14.s390.rpm |
CentOS | 3 | s390x | evolution | < 1.4.5-14 | evolution-1.4.5-14.s390x.rpm |
CentOS | 3 | s390x | evolution-devel | < 1.4.5-14 | evolution-devel-1.4.5-14.s390x.rpm |
CentOS | any | x86_64 | evolution | < 1.4.5-14 | evolution-1.4.5-14.x86_64.rpm |
CentOS | any | x86_64 | evolution-devel | < 1.4.5-14 | evolution-devel-1.4.5-14.x86_64.rpm |
CentOS | any | i386 | evolution | < 1.4.5-14 | evolution-1.4.5-14.i386.rpm |
CentOS | any | i386 | evolution-devel | < 1.4.5-14 | evolution-devel-1.4.5-14.i386.rpm |
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.005 Low
EPSS
Percentile
76.8%