Advisories


   openSUSE Security Update: Security update for alpine
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0675-1
Rating:             moderate
References:         #1173281 
Cross-References:   CVE-2020-14929
CVSS scores:
                    CVE-2020-14929 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
                    CVE-2020-14929 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for alpine fixes the following issues:

   Update to release 2.24

   * A few crash fixes
   * Implementation of XOAUTH2 for Yahoo! Mail.

   Update to release 2.23.2

   * Expansion of the configuration screen for XOAUTH2 to include username,
     and tenant.
   * Alpine uses the domain in the From: header of a message to generate a
     message-id and suppresses all information about Alpine, version,
     revision, and time of generation
     of the message-id from this header.
   * Alpine does not generate Sender or X-X-Sender by default by enabling [X]
     Disable Sender as the default.
   * Alpine does not disclose User Agent by default by enabling [X] Suppress
     User Agent by default.
   * When messages are selected, pressing the ';' command to broaden or
     narrow a search, now offers the possibility to completely replace the
     search, and is almost equivalent to being a shortcut to "unselect all
     messages, and select again".

   Update to release 2.23

   * Fixes boo#1173281, CVE-2020-14929: Alpine silently proceeds to use an
     insecure connection after a /tls is sent in certain circumstances.
   * Implementation of XOAUTH2 authentication support for Outlook.
   * Add support for the OAUTHBEARER authentication method in Gmail.
   * Support for the SASL-IR IMAP extension.
   * Alpine can pass an HTML message to an external web browser, by using the
     "External" command in the ATTACHMENT INDEX screen.

   Update to release 2.22

   * Support for XOAUTH2 authentication method in Gmail.
   * NTLM authentication support with the ntlm library.
   * Added the "/tls1_3" flag for servers that support it.
   * Add the "g" option to the select command that works in IMAP servers that
     implement the X-GM-EXT-1 capability (such as the
     one offered by Gmail).
   * Added "/auth=XYZ" to the way to define a server. This allows users to
     select the method to authenticate to an IMAP, SMTP
     or POP3 server. Examples are /auth=plain, or /auth=gssapi, etc.
   * When a message is of type multipart/mixed, and its first part is
     multipart/signed, Alpine will include the text of the
     original message in a reply message, instead of including a multipart
      attachment.
   * Added backward search in the index screen.
   * pico: Add -dict option to Pico, which allows users to choose a
     dictionary when spelling.
   - Drop /usr/bin/mailutil, it is not built by default anymore.

   * Added Quota subcommands for printing, forwarding, saving, etc.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-675=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      alpine-2.24-lp152.5.3.1
      alpine-debuginfo-2.24-lp152.5.3.1
      alpine-debugsource-2.24-lp152.5.3.1
      pico-5.07-lp152.5.3.1
      pico-debuginfo-5.07-lp152.5.3.1
      pilot-2.99-lp152.5.3.1
      pilot-debuginfo-2.99-lp152.5.3.1


References:

   https://www.suse.com/security/cve/CVE-2020-14929.html
   https://bugzilla.suse.com/1173281

Warning: getimagesize(/images/distros-large/opensuse-large.png): failed to open stream: No such file or directory in /var/www/webstage.linuxsecurity.com-443/html/templates/newsberg/html/com_content/article/default.php on line 107

Warning: Division by zero in /var/www/webstage.linuxsecurity.com-443/html/templates/newsberg/html/com_content/article/default.php on line 110

openSUSE: 2021:0675-1 moderate: alpine

An update that fixes one vulnerability is now available.

   openSUSE Security Update: Security update for alpine
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0675-1
Rating:             moderate
References:         #1173281 
Cross-References:   CVE-2020-14929
CVSS scores:
                    CVE-2020-14929 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
                    CVE-2020-14929 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for alpine fixes the following issues:

   Update to release 2.24

   * A few crash fixes
   * Implementation of XOAUTH2 for Yahoo! Mail.

   Update to release 2.23.2

   * Expansion of the configuration screen for XOAUTH2 to include username,
     and tenant.
   * Alpine uses the domain in the From: header of a message to generate a
     message-id and suppresses all information about Alpine, version,
     revision, and time of generation
     of the message-id from this header.
   * Alpine does not generate Sender or X-X-Sender by default by enabling [X]
     Disable Sender as the default.
   * Alpine does not disclose User Agent by default by enabling [X] Suppress
     User Agent by default.
   * When messages are selected, pressing the ';' command to broaden or
     narrow a search, now offers the possibility to completely replace the
     search, and is almost equivalent to being a shortcut to "unselect all
     messages, and select again".

   Update to release 2.23

   * Fixes boo#1173281, CVE-2020-14929: Alpine silently proceeds to use an
     insecure connection after a /tls is sent in certain circumstances.
   * Implementation of XOAUTH2 authentication support for Outlook.
   * Add support for the OAUTHBEARER authentication method in Gmail.
   * Support for the SASL-IR IMAP extension.
   * Alpine can pass an HTML message to an external web browser, by using the
     "External" command in the ATTACHMENT INDEX screen.

   Update to release 2.22

   * Support for XOAUTH2 authentication method in Gmail.
   * NTLM authentication support with the ntlm library.
   * Added the "/tls1_3" flag for servers that support it.
   * Add the "g" option to the select command that works in IMAP servers that
     implement the X-GM-EXT-1 capability (such as the
     one offered by Gmail).
   * Added "/auth=XYZ" to the way to define a server. This allows users to
     select the method to authenticate to an IMAP, SMTP
     or POP3 server. Examples are /auth=plain, or /auth=gssapi, etc.
   * When a message is of type multipart/mixed, and its first part is
     multipart/signed, Alpine will include the text of the
     original message in a reply message, instead of including a multipart
      attachment.
   * Added backward search in the index screen.
   * pico: Add -dict option to Pico, which allows users to choose a
     dictionary when spelling.
   - Drop /usr/bin/mailutil, it is not built by default anymore.

   * Added Quota subcommands for printing, forwarding, saving, etc.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-675=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      alpine-2.24-lp152.5.3.1
      alpine-debuginfo-2.24-lp152.5.3.1
      alpine-debugsource-2.24-lp152.5.3.1
      pico-5.07-lp152.5.3.1
      pico-debuginfo-5.07-lp152.5.3.1
      pilot-2.99-lp152.5.3.1
      pilot-debuginfo-2.99-lp152.5.3.1


References:

   https://www.suse.com/security/cve/CVE-2020-14929.html
   https://bugzilla.suse.com/1173281

Print  

openSUSE: 2021:0675-1 moderate: alpine

May 6, 2021
An update that fixes one vulnerability is now available.

Summary

Update to release 2.24 * A few crash fixes * Implementation of XOAUTH2 for Yahoo! Mail. Update to release 2.23.2 * Expansion of the configuration screen for XOAUTH2 to include username, and tenant. * Alpine uses the domain in the From: header of a message to generate a message-id and suppresses all information about Alpine, version, revision, and time of generation of the message-id from this header. * Alpine does not generate Sender or X-X-Sender by default by enabling [X] Disable Sender as the default. * Alpine does not disclose User Agent by default by enabling [X] Suppress User Agent by default. * When messages are selected, pressing the ';' command to broaden or narrow a search, now offers the possibility to completely replace the search, and is almost equivalent to being a shortcut to "unselect all messages, and select again". Update to release 2.23 * Fixes boo#1173281, CVE-2020-14929: Alpine silently proceeds to use an insecure connection after a /tls is sent in certain circumstances. * Implementation of XOAUTH2 authentication support for Outlook. * Add support for the OAUTHBEARER authentication method in Gmail. * Support for the SASL-IR IMAP extension. * Alpine can pass an HTML message to an external web browser, by using the "External" command in the ATTACHMENT INDEX screen. Update to release 2.22 * Support for XOAUTH2 authentication method in Gmail. * NTLM authentication support with the ntlm library. * Added the "/tls1_3" flag for servers that support it. * Add the "g" option to the select command that works in IMAP servers that implement the X-GM-EXT-1 capability (such as the one offered by Gmail). * Added "/auth=XYZ" to the way to define a server. This allows users to select the method to authenticate to an IMAP, SMTP or POP3 server. Examples are /auth=plain, or /auth=gssapi, etc. * When a message is of type multipart/mixed, and its first part is multipart/signed, Alpine will include the text of the original message in a reply message, instead of including a multipart attachment. * Added backward search in the index screen. * pico: Add -dict option to Pico, which allows users to choose a dictionary when spelling. - Drop /usr/bin/mailutil, it is not built by default anymore. * Added Quota subcommands for printing, forwarding, saving, etc.

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-675=1

List

Package List: - openSUSE Leap 15.2 (x86_64): alpine-2.24-lp152.5.3.1 alpine-debuginfo-2.24-lp152.5.3.1 alpine-debugsource-2.24-lp152.5.3.1 pico-5.07-lp152.5.3.1 pico-debuginfo-5.07-lp152.5.3.1 pilot-2.99-lp152.5.3.1 pilot-debuginfo-2.99-lp152.5.3.1
Severity
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0675-1
Rating: moderate
References: #1173281
Cross-References: CVE-2020-14929
CVSS scores:
CVE-2020-14929 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2020-14929 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
openSUSE Leap 15.2

References

References: https://www.suse.com/security/cve/CVE-2020-14929.html https://bugzilla.suse.com/1173281

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.