Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PGP message, an attacker can cause the product to display a "correctly signed" message indication, but display different unauthenticated text.
{ "binaries": [ { "binary_version": "2:2.1.6+ds1-1~ubuntu0.16.04.1", "binary_name": "enigmail" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-12269.json"
{ "binaries": [ { "binary_version": "2:2.2.4-0ubuntu0.18.04.1", "binary_name": "enigmail" } ] }