openSUSE-SU-2021:1045-1: moderate: Security update for claws-mail
openSUSE Security Update: Security update for claws-mail ______________________________________________________________________________ Announcement ID: openSUSE-SU-2021:1045-1 Rating: moderate References: #1174457 Cross-References: CVE-2020-15917 CVSS scores: CVE-2020-15917 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: openSUSE Leap 15.2 openSUSE Backports SLE-15-SP3 openSUSE Backports SLE-15-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for claws-mail fixes the following issues: Update to 3.18.0 * Support for the OAuth2 authorisation protocol has been added for IMAP, POP and SMTP using custom, user-generated client IDs. OAuth2 preferences are found in the Account Preferences on the Receive page (for POP: Authenticate before POP connection, for IMAP: Authentication method); the Send page (SMTP authentication: Authentication method); and on a dedicated OAuth2 page. * The option 'Save (X-)Face in address book if possible' has been added to the /Message View/Text Options preferences page. Previously the (X-)Face would be saved automatically, therefore this option is turned on by default. * The Image Viewer has been reworked. New options have been added to /Message View/Image Viewer: when resizing images, either fit the image width or fit the image height to the available space. Fitting the image height is the default. Regardless of this setting, when displaying images inline they will fit the height. When displaying an image, left-clicking the image will toggle between full size and reduced size; right-clicking will toggle between fitting the height and fitting the width. * When re-editing a saved message, it is now possible to use /Options/Remove References. * It is now possible to attempt to retrieve a missing GPG key via WKD. * The man page has been updated. * Updated translations: Brazilian Portuguese, British English, Catalan, Czech, Danish, Dutch, French, Polish, Romanian, Russian, Slovak, Spanish, Traditional Chinese, Turkish. * bug fixes: claws#2411, claws#4326, claws#4394, claws#4431, claws#4445, claws#4447, claws#4455, claws#4473 - stop WM's X button from causing GPG key fetch attempt - Make fancy respect default font size for messageview - harden link checker before accepting click - non-display of (X-)Face when prefs_common.enable_avatars is AVATARS_ENABLE_RENDER (2) - debian bug #983778, 'Segfault on selecting empty 'X-Face' custom header' * It is now possible to 'Inherit Folder properties and processing rules from parent folder' when creating new folders with the move message and copy message dialogues. * A Phishing warning is now shown when copying a phishing URL, (in addition to clicking a phishing URL). * The progress window when importing an mbox file is now more responsive. * A warning dialogue is shown if the selected privacy system is 'None' and automatic signing amd/or encrypting is enabled. * Python plugin: pkgconfig is now used to check for python2. This enables the Python plugin (which uses python2) to be built on newer systems which have both python2 and python3. Bug fixes: * bug 3922, 'minimize to tray on startup not working' * bug 4220, 'generates files in cache without content' * bug 4325, 'Following redirects when retrieving image' * bug 4342, 'Import mbox file command doesn't work twice on a row' * fix STARTTLS protocol violation CVE-2020-15917 boo#1174457) * fix initial debug line * fix fat-fingered crash when v (hiding msgview) is pressed just before c (check signature) * fix non-translation of some Templates strings Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1045=1 - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2021-1045=1 - openSUSE Backports SLE-15-SP2: zypper in -t patch openSUSE-2021-1045=1 Package List: - openSUSE Leap 15.2 (noarch): claws-mail-lang-3.18.0-lp152.3.9.1 - openSUSE Leap 15.2 (x86_64): claws-mail-3.18.0-lp152.3.9.1 claws-mail-debuginfo-3.18.0-lp152.3.9.1 claws-mail-debugsource-3.18.0-lp152.3.9.1 claws-mail-devel-3.18.0-lp152.3.9.1 - openSUSE Backports SLE-15-SP3 (aarch64 ppc64le s390x x86_64): claws-mail-3.18.0-bp153.2.3.1 claws-mail-debuginfo-3.18.0-bp153.2.3.1 claws-mail-debugsource-3.18.0-bp153.2.3.1 claws-mail-devel-3.18.0-bp153.2.3.1 - openSUSE Backports SLE-15-SP3 (noarch): claws-mail-lang-3.18.0-bp153.2.3.1 - openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64): claws-mail-3.18.0-bp152.3.9.1 claws-mail-devel-3.18.0-bp152.3.9.1 - openSUSE Backports SLE-15-SP2 (noarch): claws-mail-lang-3.18.0-bp152.3.9.1 References: https://www.suse.com/security/cve/CVE-2020-15917.html https://bugzilla.suse.com/1174457
participants (1)
-
opensuse-security@opensuse.org