Source: enigmail
Version: 2:2.0.10+ds1-1
Severity: important
Tags: security upstream
Forwarded: https://sourceforge.net/p/enigmail/bugs/983/

Hi,

The following vulnerability was published for enigmail.

CVE-2019-12269[0]:
| Enigmail before 2.0.11 allows PGP signature spoofing: for an inline
| PGP message, an attacker can cause the product to display a "correctly
| signed" message indication, but display different unauthenticated
| text.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-12269
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12269
[1] https://sourceforge.net/p/enigmail/bugs/983/

Please adjust the affected versions in the BTS as needed, probably
every version as well before 2:2.0.10+dfs1-1 would be affected.

Regards,
Salvatore

Reply via email to