-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 889-1 security@xxxxxxxxxx http://www.debian.org/security/ Martin Schulze November 8th, 2005 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : enigmail Vulnerability : programming error Problem type : local (remote) Debian-specific: no CVE ID : CAN-2005-3256 CERT advisory : VU#805121 Debian Bug : 335731 A bug has been discovered in enigmail, GPG support for Mozilla MailNews and Mozilla Thunderbird, that can lead to the encryption of mail with the wrong public key, hence, potential disclosure of confidential data to others. The old stable distribution (woody) does not contain enigmail packages. For the stable distribution (sarge) this problem has been fixed in version 0.91-4sarge2. For the unstable distribution (sid) this problem has been fixed in version 0.93-1. We recommend that you upgrade your enigmail packages. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91-4sarge2.dsc Size/MD5 checksum: 876 75a0758ff71b8651e26cb3d16320cb04 http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91-4sarge2.diff.gz Size/MD5 checksum: 17190 9d19e21a4feaf5177216646635949398 http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91.orig.tar.gz Size/MD5 checksum: 2027147 b802d62ea602d82d8d0c69cc807bf83a Alpha architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_alpha.deb Size/MD5 checksum: 345752 818ab632bcb4ea7e8b4105086aa2b904 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_alpha.deb Size/MD5 checksum: 350004 5087cf1624f2d70c5f0a543604556596 AMD64 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_amd64.deb Size/MD5 checksum: 314392 f9f5d14e6e0d000cfc3394ecdd6115d7 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_amd64.deb Size/MD5 checksum: 318672 d9fe5cf1c8c747e2c750f4687115f735 ARM architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_arm.deb Size/MD5 checksum: 301182 0f7100552d152f8018726349de1bade3 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_arm.deb Size/MD5 checksum: 306332 cd5027429531a8c3b87d9a2c5e8aaaab Intel IA-32 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_i386.deb Size/MD5 checksum: 298752 1ab5eee62ddb846a74441bc50d0120cf http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_i386.deb Size/MD5 checksum: 304076 eb8586436db24bf342f69b1d3996c37e Intel IA-64 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_ia64.deb Size/MD5 checksum: 360432 cff589e212e6852048c65121be50e06c http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_ia64.deb Size/MD5 checksum: 365434 f5571495756e2b8a72bf609bf2e73824 HP Precision architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_hppa.deb Size/MD5 checksum: 321090 c2038c3d7274addf7387790275d668a1 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_hppa.deb Size/MD5 checksum: 325354 c285ed213fc3a9cc62bbe2c0ac84ca2e Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_m68k.deb Size/MD5 checksum: 299930 6f45c5101ae36faa4bef8f4bfb5dedaa http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_m68k.deb Size/MD5 checksum: 305212 aade8a0d36c5205034c845fa803c230f Big endian MIPS architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_mips.deb Size/MD5 checksum: 308046 11eec39a832de3fe90794a5958044678 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_mips.deb Size/MD5 checksum: 313148 358aa614e2b4fb330a162b6bdd8a19b7 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_mipsel.deb Size/MD5 checksum: 307274 5fa7f930926d0fdf8e60d86eda6c6579 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_mipsel.deb Size/MD5 checksum: 312344 98db4ceb10b7848d8e58c83a8a02e968 PowerPC architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_powerpc.deb Size/MD5 checksum: 300700 ee25b159b35a02b6d1e5f45212d6dae7 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_powerpc.deb Size/MD5 checksum: 305824 6fbe747eb1eb09f56e634c6f9f21cef8 IBM S/390 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_s390.deb Size/MD5 checksum: 322512 1dbfe3be09e79091a5f01ae7f0b251a2 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_s390.deb Size/MD5 checksum: 327176 a3a75f4c3782ed0e6e7fdb881e753661 Sun Sparc architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_sparc.deb Size/MD5 checksum: 299788 009c91ff056a4b6a3bf9adc5a3425335 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_sparc.deb Size/MD5 checksum: 304074 a6fb00b36e7d52d91a136327928338c9 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDcElDW5ql+IAeqTIRAvhiAKCWBcDVjwjI7fsMUdGWzR+v7r4R+wCfVbr1 62hrrDtJEhQT9SzSOaGVuJo= =Q5yZ -----END PGP SIGNATURE-----