UBUNTU-CVE-2021-39361

Source
https://ubuntu.com/security/CVE-2021-39361
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-39361.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-39361
Related
Published
2021-08-22T19:15:00Z
Modified
2024-10-15T14:08:21Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

In GNOME evolution-rss through 0.3.96, network-soup.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.

References

Affected packages

Ubuntu:Pro:16.04:LTS / evolution-rss

Package

Name
evolution-rss
Purl
pkg:deb/ubuntu/evolution-rss?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.3.95-2
0.3.95-4build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / evolution-rss

Package

Name
evolution-rss
Purl
pkg:deb/ubuntu/evolution-rss?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.3.95-7build1
0.3.95-8
0.3.95-8build1
0.3.95-8build2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / evolution-rss

Package

Name
evolution-rss
Purl
pkg:deb/ubuntu/evolution-rss?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.3.95-10build1
0.3.95-11
0.3.95-11ubuntu1
0.3.95-12
0.3.96-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / evolution-rss

Package

Name
evolution-rss
Purl
pkg:deb/ubuntu/evolution-rss?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.3.96-3
0.3.96-4
0.3.96-4build1
0.3.96-4build2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}