SUSE-RU-2016:2383-1: Recommended update for mutt

sle-updates at sle-updates at
Mon Sep 26 06:10:26 MDT 2016

   SUSE Recommended Update: Recommended update for mutt

Announcement ID:    SUSE-RU-2016:2383-1
Rating:             low
References:         #961470 #968699 #983722 
Affected Products:
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Desktop 12-SP1

   An update that has three recommended fixes can now be


   The Mutt mail client was updated to version 1.6.0, which brings many new
   features, fixes and enhancements:

   - Enable UTF-8 mailbox support for IMAP.
   - New expandos %r and %R for comma separated list of To: and Cc:
     recipients respectively.
   - Improved support for internationalized email and SMTPUTF8 (RFCs
   - Option $use_idn has been renamed to $idn_decode.
   - New option $idn_encode controls whether outgoing email address domains
     will be IDNA encoded. If your MTA supports it, unset to use utf-8 email
     address domains.
   - The S/MIME message digest algorithm is now specified using the option
     $smime_sign_digest_alg. Note that $smime_sign_command should be modified
     to include "-md %d". Please see contrib/smime.rc.
   - New option $reflow_space_quotes allows format=flowed email quotes to be
     displayed with spacing between them.
   - Multipart draft files are now supported.
   - The "-E" command line argument causes mutt to edit draft or include
     files. All changes made in mutt will be saved back out to those files.
   - New option $resume_draft_files and $resume_edited_draft_files control
     how mutt processes draft files.
   - For classic gpg mode, $pgp_decryption_okay should be set to verify
     multipart/encrypted are actually encrypted. Please see contrib/gpg.rc
     for the suggested value.
   - mailto URL header parameters by default are now restricted to 'body' and
   - mailto_allow and unmailto_allow can be used to add or remove allowed
     mailto header parameters.
   - The method of setting $hostname has been changed. Instead of scanning
     /etc/resolv.conf, the domain will now be determined using DNS calls.
   - Add terminal status-line (TS) support, a.k.a. xterm title. See the
     following variables: $ts_enabled, $ts_icon_format, $ts_status_format.
   - Option $ssl_use_sslv3 is now disabled by default.
   - New command-line arguments: -H now combines template and command-line
     address arguments.
   - GnuPG signature name is set to signature.asc.
   - New color object "prompt" added.
   - Ability to encrypt postponed messages. See $postpone_encrypt and
   - History ring now has a scratch buffer.
   - mail-key is implemented for GPGME.
   - Removed GPG_AGENT_INFO check for GnuPG 2.1 compatibility. Please set
     pgp_use_gpg_agent if using GnuPG 2.1 or later.
   - Option $smime_encrypt_with now defaults to aes256.
   - GnuPG fingerprints are used internally when possible.
     "--with-fingerprint" should be added to $pgp_list_pubring_command and
     $pgp_list_secring_command to enable this. Please see contrib/gpg.rc.
     Fingerprints may also be used at the prompts for key selection.
   - Option $crypt_opportunistic_encrypt automatically enables/disables
     encryption based on message recipients.
   - Attachments for signed, unencrypted emails may be deleted.
   - Multiple crypt-hooks may be defined for the same regexp. This means
     multiple keys may be used for a recipient.
   - Option $crypt_confirmhook allows the confirmation prompt for crypt-hooks
     to be disabled.
   - Option $ssl_ciphers allows the SSL ciphers to be directly set.
   - sime_keys better handles importing certificate chains.
   - sime_keys now records certificate purposes (sign/encrypt). Run
     "sime_keys refresh" to update smime index files.
   - Option $maildir_check_cur polls the maildir "cur" directory for new mail.
   - Add support for TLS 1.1/1.2.
   - Correctly shorten imaps:// to INBOX, not to NBOX.
   - Recommend installation of perl(Expect) as a useful helper script below
     the samples depends on it. (bsc#968699)

   A comprehensive list of changes is available at

Patch Instructions:

   To install this SUSE Recommended Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1383=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1383=1

   To bring your system up-to-date, use "zypper patch".

Package List:

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):


   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):



More information about the sle-updates mailing list