<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for claws-mail</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:1045-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-07-15T22:06:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-07-15T22:06:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-07-15T22:06:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for claws-mail</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for claws-mail fixes the following issues:

Update to 3.18.0

  * Support for the OAuth2 authorisation protocol has been added for
    IMAP, POP and SMTP using custom, user-generated client IDs.
    OAuth2 preferences are found in the Account Preferences on the
    Receive page (for POP: Authenticate before POP connection, for
    IMAP: Authentication method); the Send page (SMTP authentication:
    Authentication method); and on a dedicated OAuth2 page.
  * The option 'Save (X-)Face in address book if possible' has been
    added to the /Message View/Text Options preferences page.
    Previously the (X-)Face would be saved automatically, therefore
    this option is turned on by default.
  * The Image Viewer has been reworked. New options have been added to
    /Message View/Image Viewer: when resizing images, either fit the
    image width or fit the image height to the available space.
    Fitting the image height is the default. Regardless of this
    setting, when displaying images inline they will fit the height.
    When displaying an image, left-clicking the image will toggle
    between full size and reduced size; right-clicking will toggle
    between fitting the height and fitting the width.
  * When re-editing a saved message, it is now possible to use
    /Options/Remove References.
  * It is now possible to attempt to retrieve a missing GPG key via
    WKD.
  * The man page has been updated.
  * Updated translations: Brazilian Portuguese, British English,
    Catalan, Czech, Danish, Dutch, French, Polish, Romanian, Russian,
    Slovak, Spanish, Traditional Chinese, Turkish.
  * bug fixes: claws#2411, claws#4326, claws#4394, claws#4431,
               claws#4445, claws#4447, claws#4455, claws#4473
    - stop WM's X button from causing GPG key fetch attempt
    - Make fancy respect default font size for messageview
    - harden link checker before accepting click
    - non-display of (X-)Face when prefs_common.enable_avatars
      is AVATARS_ENABLE_RENDER (2)
    - debian bug #983778, 'Segfault on selecting empty 'X-Face'
      custom header'

  * It is now possible to 'Inherit Folder properties and processing
    rules from parent folder' when creating new folders with the
    move message and copy message dialogues.
  * A Phishing warning is now shown when copying a phishing URL, (in
    addition to clicking a phishing URL).
  * The progress window when importing an mbox file is now more
    responsive.
  * A warning dialogue is shown if the selected privacy system is
    'None' and automatic signing amd/or encrypting is enabled.
  * Python plugin: pkgconfig is now used to check for python2. This
    enables the Python plugin (which uses python2) to be built on
    newer systems which have both python2 and python3.

  Bug fixes:

  * bug 3922, 'minimize to tray on startup not working'
  * bug 4220, 'generates files in cache without content'
  * bug 4325, 'Following redirects when retrieving image'
  * bug 4342, 'Import mbox file command doesn't work twice on a row'
  * fix STARTTLS protocol violation CVE-2020-15917 boo#1174457)
  * fix initial debug line
  * fix fat-fingered crash when v (hiding msgview) is pressed
    just before c (check signature)
  * fix non-translation of some Templates strings

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-1045</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2VE6WDEXX6HETWFB6EGOWAEY6QQSAI6E/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:1045-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174457</URL>
      <Description>SUSE Bug 1174457</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15917/</URL>
      <Description>SUSE CVE CVE-2020-15917 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP2">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP2">
        <FullProductName ProductID="SUSE Package Hub 15 SP2">SUSE Package Hub 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP3">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP3">
        <FullProductName ProductID="SUSE Package Hub 15 SP3">SUSE Package Hub 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="claws-mail-3.18.0-bp153.2.3.1">
      <FullProductName ProductID="claws-mail-3.18.0-bp153.2.3.1">claws-mail-3.18.0-bp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="claws-mail-devel-3.18.0-bp153.2.3.1">
      <FullProductName ProductID="claws-mail-devel-3.18.0-bp153.2.3.1">claws-mail-devel-3.18.0-bp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="claws-mail-lang-3.18.0-bp153.2.3.1">
      <FullProductName ProductID="claws-mail-lang-3.18.0-bp153.2.3.1">claws-mail-lang-3.18.0-bp153.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="claws-mail-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:claws-mail-3.18.0-bp153.2.3.1">claws-mail-3.18.0-bp153.2.3.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-devel-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:claws-mail-devel-3.18.0-bp153.2.3.1">claws-mail-devel-3.18.0-bp153.2.3.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-lang-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:claws-mail-lang-3.18.0-bp153.2.3.1">claws-mail-lang-3.18.0-bp153.2.3.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:claws-mail-3.18.0-bp153.2.3.1">claws-mail-3.18.0-bp153.2.3.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-devel-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:claws-mail-devel-3.18.0-bp153.2.3.1">claws-mail-devel-3.18.0-bp153.2.3.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-lang-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:claws-mail-lang-3.18.0-bp153.2.3.1">claws-mail-lang-3.18.0-bp153.2.3.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:claws-mail-3.18.0-bp153.2.3.1">claws-mail-3.18.0-bp153.2.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-devel-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:claws-mail-devel-3.18.0-bp153.2.3.1">claws-mail-devel-3.18.0-bp153.2.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-lang-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:claws-mail-lang-3.18.0-bp153.2.3.1">claws-mail-lang-3.18.0-bp153.2.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:claws-mail-3.18.0-bp153.2.3.1">claws-mail-3.18.0-bp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-devel-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:claws-mail-devel-3.18.0-bp153.2.3.1">claws-mail-devel-3.18.0-bp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="claws-mail-lang-3.18.0-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:claws-mail-lang-3.18.0-bp153.2.3.1">claws-mail-lang-3.18.0-bp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.</Note>
    </Notes>
    <CVE>CVE-2020-15917</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:claws-mail-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:claws-mail-devel-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:claws-mail-lang-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:claws-mail-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:claws-mail-devel-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:claws-mail-lang-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:claws-mail-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:claws-mail-devel-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:claws-mail-lang-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:claws-mail-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:claws-mail-devel-3.18.0-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:claws-mail-lang-3.18.0-bp153.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2VE6WDEXX6HETWFB6EGOWAEY6QQSAI6E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15917.html</URL>
        <Description>CVE-2020-15917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174457</URL>
        <Description>SUSE Bug 1174457</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
