Upstream information
Description
In KDE KMail 5.2.3, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
SUSE Bugzilla entry: 1131885 [RESOLVED / FIXED]SUSE Security Advisories:
- openSUSE-SU-2021:0188-1, published Tue Feb 16 10:27:50 2021
- openSUSE-SU-2021:0227-1, published Tue Feb 16 10:27:50 2021
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Package Hub 15 SP1 |
| Patchnames: openSUSE-2021-227 |
openSUSE Leap 15.1 |
| Patchnames: openSUSE-2021-188 |
openSUSE Leap 15.2 |
| Patchnames: openSUSE Leap 15.2 GA messagelib-20.04.2-lp152.1.1 |
openSUSE Leap 15.3 |
| Patchnames: openSUSE Leap 15.3 GA messagelib-20.04.2-bp153.1.29 |
openSUSE Leap 15.4 |
| Patchnames: openSUSE Leap 15.4 GA messagelib-21.12.3-bp154.1.22 |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-11046 |
SUSE Timeline for this CVE
CVE page created: Sun Apr 7 18:45:21 2019CVE page last modified: Mon Sep 9 13:36:30 2024