File _patchinfo of Package patchinfo.21926
<patchinfo incident="21926">
<issue tracker="bnc" id="1152964">Fetchmail needs an update (from 6.3 to 6.4)</issue>
<issue tracker="bnc" id="1174075">Changing %{_libexecdir} breaks some packages which are misusing the macro</issue>
<issue tracker="bnc" id="1181400">AUDIT-TASK: Evaluate systemd hardenings and get more services to use them</issue>
<issue tracker="bnc" id="1188875">VUL-0: CVE-2021-36386: fetchmail: DoS or information disclosure in some configurations</issue>
<issue tracker="bnc" id="1190069">VUL-0: CVE-2021-39272: fetchmail: STARTTLS session encryption bypassing</issue>
<issue tracker="bnc" id="1190896">fetchmail requires Python 2</issue>
<issue tracker="cve" id="2021-36386"/>
<issue tracker="cve" id="2021-39272"/>
<issue tracker="jsc" id="SLE-17903"/>
<issue tracker="jsc" id="SLE-18059"/>
<issue tracker="jsc" id="SLE-18159"/>
<packager>pmonrealgonzalez</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for fetchmail</summary>
<description>This update for fetchmail fixes the following issues:
- CVE-2021-36386: Fixed DoS or information disclosure in some configurations (bsc#1188875).
- CVE-2021-39272: Fixed STARTTLS session encryption bypassing (fetchmail-SA-2021-02) (bsc#1190069).
- Update to 6.4.22 (bsc#1152964, jsc#SLE-18159, jsc#SLE-17903, jsc#SLE-18059)
- Remove all python2 dependencies (bsc#1190896).
- De-hardcode /usr/lib path for launch executable (bsc#1174075).
- Added hardening to systemd service(s) (bsc#1181400).
</description>
</patchinfo>