Linux Security
    Linux Security
    Linux Security

    Debian: New enigmail packages fix information disclosure

    Date 07 Nov 2005
    Posted By Joe Shakespeare
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 889-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    November 8th, 2005            
    - --------------------------------------------------------------------------
    Package        : enigmail
    Vulnerability  : programming error
    Problem type   : local (remote)
    Debian-specific: no
    CVE ID         : CAN-2005-3256
    CERT advisory  : VU#805121
    Debian Bug     : 335731
    A bug has been discovered in enigmail, GPG support for Mozilla
    MailNews and Mozilla Thunderbird, that can lead to the encryption of
    mail with the wrong public key, hence, potential disclosure of
    confidential data to others.
    The old stable distribution (woody) does not contain enigmail packages.
    For the stable distribution (sarge) this problem has been fixed in
    version 0.91-4sarge2.
    For the unstable distribution (sid) this problem has been fixed in
    version 0.93-1.
    We recommend that you upgrade your enigmail packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      876 75a0758ff71b8651e26cb3d16320cb04
          Size/MD5 checksum:    17190 9d19e21a4feaf5177216646635949398
          Size/MD5 checksum:  2027147 b802d62ea602d82d8d0c69cc807bf83a
      Alpha architecture:
          Size/MD5 checksum:   345752 818ab632bcb4ea7e8b4105086aa2b904
          Size/MD5 checksum:   350004 5087cf1624f2d70c5f0a543604556596
      AMD64 architecture:
          Size/MD5 checksum:   314392 f9f5d14e6e0d000cfc3394ecdd6115d7
          Size/MD5 checksum:   318672 d9fe5cf1c8c747e2c750f4687115f735
      ARM architecture:
          Size/MD5 checksum:   301182 0f7100552d152f8018726349de1bade3
          Size/MD5 checksum:   306332 cd5027429531a8c3b87d9a2c5e8aaaab
      Intel IA-32 architecture:
          Size/MD5 checksum:   298752 1ab5eee62ddb846a74441bc50d0120cf
          Size/MD5 checksum:   304076 eb8586436db24bf342f69b1d3996c37e
      Intel IA-64 architecture:
          Size/MD5 checksum:   360432 cff589e212e6852048c65121be50e06c
          Size/MD5 checksum:   365434 f5571495756e2b8a72bf609bf2e73824
      HP Precision architecture:
          Size/MD5 checksum:   321090 c2038c3d7274addf7387790275d668a1
          Size/MD5 checksum:   325354 c285ed213fc3a9cc62bbe2c0ac84ca2e
      Motorola 680x0 architecture:
          Size/MD5 checksum:   299930 6f45c5101ae36faa4bef8f4bfb5dedaa
          Size/MD5 checksum:   305212 aade8a0d36c5205034c845fa803c230f
      Big endian MIPS architecture:
          Size/MD5 checksum:   308046 11eec39a832de3fe90794a5958044678
          Size/MD5 checksum:   313148 358aa614e2b4fb330a162b6bdd8a19b7
      Little endian MIPS architecture:
          Size/MD5 checksum:   307274 5fa7f930926d0fdf8e60d86eda6c6579
          Size/MD5 checksum:   312344 98db4ceb10b7848d8e58c83a8a02e968
      PowerPC architecture:
          Size/MD5 checksum:   300700 ee25b159b35a02b6d1e5f45212d6dae7
          Size/MD5 checksum:   305824 6fbe747eb1eb09f56e634c6f9f21cef8
      IBM S/390 architecture:
          Size/MD5 checksum:   322512 1dbfe3be09e79091a5f01ae7f0b251a2
          Size/MD5 checksum:   327176 a3a75f4c3782ed0e6e7fdb881e753661
      Sun Sparc architecture:
          Size/MD5 checksum:   299788 009c91ff056a4b6a3bf9adc5a3425335
          Size/MD5 checksum:   304074 a6fb00b36e7d52d91a136327928338c9
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"15","type":"x","order":"1","pct":36.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"8","type":"x","order":"2","pct":19.51,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"18","type":"x","order":"3","pct":43.9,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.