Package name
Advisory ID
Affected versions
2006.0 i586 , 2006.0 x86_64

Problem description

GNOME Evolution allows remote attackers to cause a denial of service
(persistent client crash) via an attached text file that contains
"Content-Disposition: inline" in the header, and a very long line in
the body, which causes the client to repeatedly crash until the e-mail
message is manually removed, possibly due to a buffer overflow, as
demonstrated using an XML attachment.

The underlying issue is in libcairo, which is used by recent versions
of Evolution for message rendering.

The Corporate Desktop 3.0 version of Evolution does not use libcairo
and is not vulnerable to this issue.

Updated packages have been patched to correct these issues.

Updated packages

2006.0 i586

 18795da3000ba593f1667b14c299a505  2006.0/RPMS/libcairo2-1.0.0-8.1.20060mdk.i586.rpm
 8cc112928efae0689998f9eeab317e16  2006.0/RPMS/libcairo2-devel-1.0.0-8.1.20060mdk.i586.rpm
 38abc115e3d581fed3788a543d54acea  2006.0/RPMS/libcairo2-static-devel-1.0.0-8.1.20060mdk.i586.rpm
 d611cf94f1bee1c88810053cc6dce68c  2006.0/SRPMS/cairo-1.0.0-8.1.20060mdk.src.rpm

2006.0 x86_64

 8b134af67bed9ea300530e02765d34bb  x86_64/2006.0/RPMS/lib64cairo2-1.0.0-8.1.20060mdk.x86_64.rpm
 e3626b3500ab87dc9abd0ef05d8b1870  x86_64/2006.0/RPMS/lib64cairo2-devel-1.0.0-8.1.20060mdk.x86_64.rpm
 ce16dbfb1065b07c758ff5afb5e89dca  x86_64/2006.0/RPMS/lib64cairo2-static-devel-1.0.0-8.1.20060mdk.x86_64.rpm
 d611cf94f1bee1c88810053cc6dce68c  x86_64/2006.0/SRPMS/cairo-1.0.0-8.1.20060mdk.src.rpm