Описание
Security update for enigmail
This update for enigmail to 2.0.7 fixes the following issues:
These security issues were fixed:
- CVE-2018-12020: Mitigation against GnuPG signature spoofing: Email signatures could be spoofed via an embedded '--filename' parameter in OpenPGP literal data packets. This update prevents this issue from being exploited if GnuPG was not updated (boo#1096745)
- CVE-2018-12019: The signature verification routine interpreted User IDs as status/control messages and did not correctly keep track of the status of multiple signatures. This allowed remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids (boo#1097525)
- Disallow plaintext (literal packets) outside of encrpyted packets
- Replies to a partially encrypted message may have revealed protected information - no longer display PGP/MIME message part followed by unencrypted data (bsc#1094781)
- Fix signature Spoofing via Inline-PGP in HTML Mails
These non-security issues were fixed:
- Fix filter actions forgetting selected mail folder names
- Fix compatibility issue with Thunderbird 60b7
Список пакетов
SUSE Linux Enterprise Workstation Extension 15
Ссылки
- Link for SUSE-SU-2018:2243-1
- E-Mail link for SUSE-SU-2018:2243-1
- SUSE Security Ratings
- SUSE Bug 1094781
- SUSE Bug 1096745
- SUSE Bug 1097525
- SUSE CVE CVE-2018-12019 page
- SUSE CVE CVE-2018-12020 page
Описание
The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids.
Затронутые продукты
Ссылки
- CVE-2018-12019
- SUSE Bug 1097525
Описание
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
Затронутые продукты
Ссылки
- CVE-2018-12020
- SUSE Bug 1096745
- SUSE Bug 1101134