<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for enigmail</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1708-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-06-15T15:04:01Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-06-15T15:04:01Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-06-15T15:04:01Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for enigmail</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for enigmail fixes vulnerabilities that allowed spoofing of e-mail signatures:

- CVE-2018-12019: signature spoofing via specially crafted OpenPGP user IDs (boo#1097525)
- CVE-2018-12020: signature spoofing via diagnostic output of the original file name in GnuPG verbose mode (boo#1096745)
This mitigation prevents CVE-2018-12020 from being exploited even if GnuPG is not patched.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-06/msg00028.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1708-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub for SUSE Linux Enterprise 12">
      <Branch Type="Product Name" Name="SUSE Package Hub for SUSE Linux Enterprise 12">
        <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 12">SUSE Package Hub for SUSE Linux Enterprise 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="enigmail-2.0.7-18.1">
      <FullProductName ProductID="enigmail-2.0.7-18.1">enigmail-2.0.7-18.1</FullProductName>
    </Branch>
    <Relationship ProductReference="enigmail-2.0.7-18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 12">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 12:enigmail-2.0.7-18.1">enigmail-2.0.7-18.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids.</Note>
    </Notes>
    <CVE>CVE-2018-12019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 12:enigmail-2.0.7-18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-06/msg00028.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12019.html</URL>
        <Description>CVE-2018-12019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097525</URL>
        <Description>SUSE Bug 1097525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.</Note>
    </Notes>
    <CVE>CVE-2018-12020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 12:enigmail-2.0.7-18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-06/msg00028.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12020.html</URL>
        <Description>CVE-2018-12020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096745</URL>
        <Description>SUSE Bug 1096745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101134</URL>
        <Description>SUSE Bug 1101134</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
