Source: enigmail
Source-Version: 2:2.0.11+ds1-1

On Wed, May 22, 2019 at 02:25:42PM +0200, Salvatore Bonaccorso wrote:
> Source: enigmail
> Version: 2:2.0.10+ds1-1
> Severity: important
> Tags: security upstream
> Forwarded: https://sourceforge.net/p/enigmail/bugs/983/
> 
> Hi,
> 
> The following vulnerability was published for enigmail.
> 
> CVE-2019-12269[0]:
> | Enigmail before 2.0.11 allows PGP signature spoofing: for an inline
> | PGP message, an attacker can cause the product to display a "correctly
> | signed" message indication, but display different unauthenticated
> | text.

This issue was adressed 2.0.11 upstream, closing manually.

Regards,
Salvatore

Reply via email to