CVE-2020-11879

NameCVE-2020-11879
DescriptionAn issue was discovered in GNOME Evolution before 3.35.91. By using the proprietary (non-RFC6068) "mailto?attach=..." parameter, a website (or other source of mailto links) can make Evolution attach local files or directories to a composed email message without showing a warning to the user, as demonstrated by an attach=. value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
evolution (PTS)jessie, jessie (lts)3.12.9~git20141130.241663-1+deb8u1vulnerable
stretch (security), stretch (lts), stretch3.22.6-1+deb9u2vulnerable
buster3.30.5-1.1vulnerable
bullseye (security), bullseye3.38.3-1+deb11u2fixed
bookworm3.46.4-2fixed
sid, trixie3.54.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
evolutionsourcewheezy(unfixed)end-of-life
evolutionsource(unstable)3.36.0-1

Notes

[buster] - evolution <no-dsa> (Minor issue)
[stretch] - evolution <no-dsa> (Minor issue)
[jessie] - evolution <no-dsa> (Minor issue)
https://gitlab.gnome.org/GNOME/evolution/issues/784
https://gitlab.gnome.org/GNOME/evolution/-/commit/6489f20d6905cc797e2b2581c415e558c457caa7

Search for package or bug name: Reporting problems