openSUSE Security Update: Security update for kmail-account-wizard
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2024:0353-1
Rating:             moderate
References:         #1232454 
Cross-References:   CVE-2024-50624
Affected Products:
                    openSUSE Backports SLE-15-SP5
                    openSUSE Backports SLE-15-SP6
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for kmail-account-wizard fixes the following issues:

   - CVE-2024-50624: Fixed that plaintext HTTP was used for URLs when
     retrieving configuration files (boo#1232454, kde#487882)


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP6:

      zypper in -t patch openSUSE-2024-353=1

   - openSUSE Backports SLE-15-SP5:

      zypper in -t patch openSUSE-2024-353=1



Package List:

   - openSUSE Backports SLE-15-SP6 (aarch64 x86_64):

      kmail-account-wizard-23.08.5-bp156.2.3.1
      kmail-account-wizard-debuginfo-23.08.5-bp156.2.3.1
      kmail-account-wizard-debugsource-23.08.5-bp156.2.3.1

   - openSUSE Backports SLE-15-SP6 (noarch):

      kmail-account-wizard-lang-23.08.5-bp156.2.3.1

   - openSUSE Backports SLE-15-SP5 (aarch64 x86_64):

      kmail-account-wizard-22.12.3-bp155.2.3.1

   - openSUSE Backports SLE-15-SP5 (noarch):

      kmail-account-wizard-lang-22.12.3-bp155.2.3.1


References:

   https://www.suse.com/security/cve/CVE-2024-50624.html
   https://bugzilla.suse.com/1232454

openSUSE: 2024:0353-1 moderate: kmail-account-wizard Advisory Security Update

November 6, 2024
An update that fixes one vulnerability is now available

Description

This update for kmail-account-wizard fixes the following issues: - CVE-2024-50624: Fixed that plaintext HTTP was used for URLs when retrieving configuration files (boo#1232454, kde#487882)

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP6: zypper in -t patch openSUSE-2024-353=1 - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2024-353=1


Package List

- openSUSE Backports SLE-15-SP6 (aarch64 x86_64): kmail-account-wizard-23.08.5-bp156.2.3.1 kmail-account-wizard-debuginfo-23.08.5-bp156.2.3.1 kmail-account-wizard-debugsource-23.08.5-bp156.2.3.1 - openSUSE Backports SLE-15-SP6 (noarch): kmail-account-wizard-lang-23.08.5-bp156.2.3.1 - openSUSE Backports SLE-15-SP5 (aarch64 x86_64): kmail-account-wizard-22.12.3-bp155.2.3.1 - openSUSE Backports SLE-15-SP5 (noarch): kmail-account-wizard-lang-22.12.3-bp155.2.3.1


References

https://www.suse.com/security/cve/CVE-2024-50624.html https://bugzilla.suse.com/1232454


Severity
Announcement ID: openSUSE-SU-2024:0353-1
Rating: moderate
Affected Products: openSUSE Backports SLE-15-SP5 openSUSE Backports SLE-15-SP6 .

Related News