-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2339
                       Security update for enigmail
                              14 August 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           enigmail
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-12020 CVE-2018-12019 

Reference:         ESB-2018.2031
                   ESB-2018.1722
                   ESB-2018.1728.3

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2018/suse-su-20182243-1.html

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for enigmail
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2243-1
Rating:             moderate
References:         #1094781 #1096745 #1097525 
Cross-References:   CVE-2018-12019 CVE-2018-12020
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 15
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:

   This update for enigmail to 2.0.7 fixes the following issues:

   These security issues were fixed:

   - CVE-2018-12020: Mitigation against GnuPG signature spoofing: Email
     signatures could be spoofed via an embedded "--filename" parameter in
     OpenPGP literal data packets. This update prevents this issue from being
     exploited if GnuPG was not updated (boo#1096745)
   - CVE-2018-12019: The signature verification routine interpreted User IDs
     as status/control messages and did not correctly keep track of the
     status of multiple signatures. This allowed remote attackers to spoof
     arbitrary email signatures via public keys containing crafted primary
     user ids (boo#1097525)
   - Disallow plaintext (literal packets) outside of encrpyted packets
   - Replies to a partially encrypted message may have revealed protected
     information - no longer display PGP/MIME message part followed by
     unencrypted data (bsc#1094781)
   - Fix signature Spoofing via Inline-PGP in HTML Mails

   These non-security issues were fixed:

   - Fix filter actions forgetting selected mail folder names
   - Fix compatibility issue with Thunderbird 60b7


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 15:

      zypper in -t patch SUSE-SLE-Product-WE-15-2018-1514=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 15 (x86_64):

      enigmail-2.0.7-3.7.2


References:

   https://www.suse.com/security/cve/CVE-2018-12019.html
   https://www.suse.com/security/cve/CVE-2018-12020.html
   https://bugzilla.suse.com/1094781
   https://bugzilla.suse.com/1096745
   https://bugzilla.suse.com/1097525

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW3JvTGaOgq3Tt24GAQiDPBAAvU2mwKPJlMIIS673vMh+RMy+1qcKdjUw
7adgo3COOKXWGRaOmjKfsyiVWtBMNOrS3tAsQDyveL/0bckYVUnj7p5MLS2tE/Gl
sU36WriNvYR6jHX9DkmFIcNY9QmaKtRROlLMy/1m2lkCxpDwQmBYltkAKnmdKKM8
DPWT2Jwvqe1XEWgEs5UiUZ5VvWzs1lK/kOoVbIjflAWl35g24fsLwGGRGlIWKIU7
Q7+kRqTzRyZms3cW3bl1//CSpYvshenjFkXDpC/YoVWrlGXvldg35HKTr97aJdmw
9oguuxO7xy3ojLr7EFVp1GymgHTZ/iBKoOYS1AnzXnSO26RWAeYWDzAFCgUSzAGq
timpFi4sMsDsJWxiw+61LclUcKEzs0THKF6v+lDi80P9Zh4B1eTzjb1RZlE/9dZu
ilaEcLWQAepZONckjrTTEggLFlMbI9U1KsCG9cw9giGW8jOKB4OqRj6/LvwJJ6aq
N4MMhdsNZpG6axOMVkWVCK2MyC+w8XHwfN3+shs0yo8pcxDZmM80vBFU9+FQYaVy
IzBEJ/lXnsO214aXIFJRoOkq/WsHMPHfVaYhcJqd9SNtpyK6dJBhRTsZEq9DvWi1
28YBDrJL6kYmY9eBtkuWhaOWsz4GdYtjPnv0T/YJ/KWw4LFpR2ErofIlVu3jv9cH
GtGpuaMDVB8=
=EtYF
-----END PGP SIGNATURE-----