UbuntuUpdates.org

Package "enigmail"

This package belongs to a PPA: Ubuntu Mozilla Security

Name: enigmail

Description:

GPG support for Thunderbird and Debian Icedove

Latest version: 2:2.0.8-1~ubuntu0.14.04.2
Release: trusty (14.04)
Level: base
Repository: main

Links

Save this URL for the latest version of "enigmail": https://www.ubuntuupdates.org/enigmail


Download "enigmail"


Other versions of "enigmail" in Trusty

Repository Area Version
base universe 2:1.5.2-0ubuntu1
security universe 2:2.0.8-1~ubuntu0.14.04.2
updates universe 2:2.0.8-1~ubuntu0.14.04.2

Changelog

Version: 2:2.0.8-1~ubuntu0.14.04.2 2018-10-09 13:07:50 UTC

 enigmail (2:2.0.8-1~ubuntu0.14.04.2) trusty-security; urgency=medium
 .
   * Backport 2.0.8 to trusty for Thunderbird 60.*
   * Revert the Debian changes to drop OpenPGP.js, as it requires a newer gnupg
     - update debian/control
     - remove debian/patches/remove-openpgpjs/0017-avoid-OpenPGP.js-when-building.patch
     - remove debian/patches/remove-openpgpjs/0018-copy-enums.armor-from-OpenPGP.js.patch
     - remove debian/patches/remove-openpgpjs/0019-avoid-OpenPGP.js-during-key-file-import.patch
     - remove debian/patches/remove-openpgpjs/0020-drop-use-of-OpenPGP.js-for-generating-minimal-keys.patch
     - add debian/patches/restore-openpgpjs.patch
     - update debian/patches/series
   * Relax debhelper requirement
     - update debian/control
     - update debian/compat
   * Use dh-autoreconf
     - update debian/control
     - update debian/rules


Version: *DELETED* 2018-07-03 13:09:42 UTC
No changelog for deleted or moved packages.

Version: 2:2.0.7-0ubuntu1~14.04.1 2018-06-14 14:10:09 UTC

 enigmail (2:2.0.7-0ubuntu1~14.04.1) trusty-security; urgency=medium
 .
   * SECURITY UPDATE: Spoofing of Email signatures
     - CVE-2018-12019, CVE-2018-12020
 .
   * Backport 2.0.7 to trusty
   * Relax debhelper requirement
     - update debian/control
     - update debian/compat

Source diff to previous version
CVE-2018-12019 The signature verification routine in Enigmail before 2.0.7 interprets ...
CVE-2018-12020 mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof

Version: 2:2.0.6-0ubuntu1~14.04.1 2018-05-29 17:08:04 UTC

 enigmail (2:2.0.6-0ubuntu1~14.04.1) trusty-security; urgency=medium
 .
   * Backport 2.0.6 to trusty
   * Relax debhelper requirement
     - update debian/control
     - update debian/compat

Source diff to previous version

Version: 2:2.0.3-0ubuntu2~14.04.1 2018-05-15 00:08:19 UTC

 enigmail (2:2.0.3-0ubuntu2~14.04.1) trusty-security; urgency=medium
 .
   * Backport 2.0.3 to trusty
   * Relax debhelper requirement
     - update debian/control
     - update debian/compat




About   -   Send Feedback to @ubuntu_updates