evolution-data-server is vulnerable to TLS response injection. When a server sends a ‘begin TLS’ response, eds reads additional data and evaluates it in a TLS context, aka “response injection” causing a STARTTLS buffering issue that affects SMTP and POP3.
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/
access.redhat.com/errata/RHSA-2020:4649
access.redhat.com/security/updates/classification/#low
bugzilla.suse.com/show_bug.cgi?id=1173910
gitlab.gnome.org/GNOME//evolution-data-server/commit/ba82be72cfd427b5d72ff21f929b3a6d8529c4df
gitlab.gnome.org/GNOME/evolution-data-server/-/commit/f404f33fb01b23903c2bbb16791c7907e457fbac
gitlab.gnome.org/GNOME/evolution-data-server/-/issues/226
lists.debian.org/debian-lts-announce/2020/07/msg00012.html
lists.fedoraproject.org/archives/list/[email protected]/message/QMBEZWA22EAYAZQWUX4KPEBER726KSIG/
security-tracker.debian.org/tracker/DLA-2281-1
security-tracker.debian.org/tracker/DSA-4725-1
usn.ubuntu.com/4429-1/
www.debian.org/security/2020/dsa-4725