openSUSE-SU-2018:1329-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2018:1329-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/openSUSE-SU-2018:1329-1
Related
Published
2018-05-17T11:35:48Z
Modified
2018-05-17T11:35:48Z
Summary
Security update for enigmail
Details

This update for enigmail to version 2.0.4 fixes multiple issues.

Security issues fixed:

  • CVE-2017-17688: CFB gadget attacks allowed to exfiltrate plaintext out of encrypted emails. enigmail now fails on GnuPG integrity check warnings for old Algorithms (bsc#1093151)
  • CVE-2017-17689: CBC gadget attacks allows to exfiltrate plaintext out of encrypted emails (bsc#1093152)

This update also includes new and updated functionality:

  • The Encryption and Signing buttons now work for both OpenPGP and S/MIME. Enigmail will chose between S/MIME or OpenPGP depending on whether the keys for all recipients are available for the respective standard
  • Support for the Autocrypt standard, which is now enabled by default
  • Support for Pretty Easy Privacy (p≡p)
  • Support for Web Key Directory (WKD)
  • The message subject can now be encrypted and replaced with a dummy subject, following the Memory Hole standard forprotected Email Headers
  • keys on keyring are automatically refreshed from keyservers at irregular intervals
  • Subsequent updates of Enigmail no longer require a restart of Thunderbird
  • Keys are internally addressed using the fingerprint instead of the key ID
References

Affected packages

SUSE:Package Hub 12 / enigmail

Package

Name
enigmail
Purl
pkg:rpm/suse/enigmail&distro=SUSE%20Package%20Hub%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.4-9.1

Ecosystem specific

{
    "binaries": [
        {
            "enigmail": "2.0.4-9.1"
        }
    ]
}