CVE-2020-15917

NameCVE-2020-15917
Descriptioncommon/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
claws-mail (PTS)jessie, jessie (lts)3.11.1-3+deb8u1vulnerable
stretch3.14.1-3vulnerable
buster3.17.3-2vulnerable
bullseye3.17.8-1fixed
bookworm4.1.1-2fixed
sid, trixie4.3.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
claws-mailsourcejessie(unfixed)end-of-life
claws-mailsource(unstable)3.17.6-1

Notes

[buster] - claws-mail <no-dsa> (Minor issue)
[stretch] - claws-mail <no-dsa> (low priority issue)
https://git.claws-mail.org/?p=claws.git;a=commit;h=fcc25329049b6f9bd8d890f1197ed61eb12e14d5

Search for package or bug name: Reporting problems