Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/enigmail@2:2.2.4-0.3?distro=bullseye
purl pkg:deb/debian/enigmail@2:2.2.4-0.3?distro=bullseye
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (16)
Vulnerability Summary Aliases
VCID-1t5g-b5jt-8yft security update CVE-2017-17847
VCID-74uy-aghm-bkhd Enigmail 0.94.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Enigmail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection. CVE-2007-1264
VCID-7535-appn-5fhm security update CVE-2017-17844
VCID-9cm4-mu3q-2yey security update CVE-2018-12020
VCID-bz74-1y1q-8qfc The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids. CVE-2018-12019
VCID-c5zg-brhd-4ygg OpenPGP: CFB gadget attacks allows to exfiltrate plaintext out of encrypted emails CVE-2017-17688
VCID-g4s8-7k7n-c3an Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PGP message, an attacker can cause the product to display a "correctly signed" message indication, but display different unauthenticated text. CVE-2019-12269
VCID-gqrn-ek3y-hbg1 security update CVE-2017-17848
VCID-mmdw-63mg-2uhm In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, he unknowingly leaks the plaintext of the encrypted message part(s) back to the attacker. This attack variant bypasses protection mechanisms implemented after the "EFAIL" attacks. CVE-2019-14664
VCID-sg6f-tksc-d3f5 The key selection dialogue in Enigmail before 0.92.1 can incorrectly select a key with a user ID that does not have additional information, which allows parties with that key to decrypt the message. CVE-2005-3256
VCID-tqpx-hedp-dfcb Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email. CVE-2018-15586
VCID-ux6a-2384-suf9 security update CVE-2017-17846
VCID-x8dz-d9af-fyg2 security update CVE-2017-17845
VCID-xbab-79ux-t3bn Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, and SeaMonkey, the worst of which may allow user-assisted execution of arbitrary code. CVE-2014-5369
VCID-yh48-k15t-gqcu The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird. CVE-2006-5877
VCID-zm59-us92-2bh1 security update CVE-2017-17843

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:29:26.440205+00:00 Debian Importer Fixing VCID-x8dz-d9af-fyg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:28:13.731620+00:00 Debian Importer Fixing VCID-mmdw-63mg-2uhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:16:36.971423+00:00 Debian Importer Fixing VCID-9cm4-mu3q-2yey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:53:16.350301+00:00 Debian Importer Fixing VCID-gqrn-ek3y-hbg1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:50:55.188156+00:00 Debian Importer Fixing VCID-bz74-1y1q-8qfc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:48:01.780046+00:00 Debian Importer Fixing VCID-zm59-us92-2bh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:28:43.457200+00:00 Debian Importer Fixing VCID-g4s8-7k7n-c3an https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:45.637376+00:00 Debian Importer Fixing VCID-c5zg-brhd-4ygg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:23.107242+00:00 Debian Importer Fixing VCID-sg6f-tksc-d3f5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:34.147167+00:00 Debian Importer Fixing VCID-yh48-k15t-gqcu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:28.158808+00:00 Debian Importer Fixing VCID-1t5g-b5jt-8yft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:40.028902+00:00 Debian Importer Fixing VCID-xbab-79ux-t3bn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:36.836204+00:00 Debian Importer Fixing VCID-7535-appn-5fhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:48.079363+00:00 Debian Importer Fixing VCID-ux6a-2384-suf9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:55.872047+00:00 Debian Importer Fixing VCID-74uy-aghm-bkhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:41.885909+00:00 Debian Importer Fixing VCID-tqpx-hedp-dfcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:18:34.243400+00:00 Debian Importer Fixing VCID-x8dz-d9af-fyg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:17:41.956427+00:00 Debian Importer Fixing VCID-mmdw-63mg-2uhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:08:34.842353+00:00 Debian Importer Fixing VCID-9cm4-mu3q-2yey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:50:52.175589+00:00 Debian Importer Fixing VCID-gqrn-ek3y-hbg1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:05.558195+00:00 Debian Importer Fixing VCID-bz74-1y1q-8qfc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:51.411500+00:00 Debian Importer Fixing VCID-zm59-us92-2bh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:20.666946+00:00 Debian Importer Fixing VCID-g4s8-7k7n-c3an https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:09.629621+00:00 Debian Importer Fixing VCID-c5zg-brhd-4ygg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:33.384863+00:00 Debian Importer Fixing VCID-sg6f-tksc-d3f5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:55.753828+00:00 Debian Importer Fixing VCID-yh48-k15t-gqcu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:51.722100+00:00 Debian Importer Fixing VCID-1t5g-b5jt-8yft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:44.161277+00:00 Debian Importer Fixing VCID-xbab-79ux-t3bn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:54.089961+00:00 Debian Importer Fixing VCID-7535-appn-5fhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:32.973677+00:00 Debian Importer Fixing VCID-ux6a-2384-suf9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:45.575740+00:00 Debian Importer Fixing VCID-74uy-aghm-bkhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:26.103376+00:00 Debian Importer Fixing VCID-tqpx-hedp-dfcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:18:43.314323+00:00 Debian Importer Fixing VCID-x8dz-d9af-fyg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:38.753514+00:00 Debian Importer Fixing VCID-mmdw-63mg-2uhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:57.207809+00:00 Debian Importer Fixing VCID-9cm4-mu3q-2yey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:28.863977+00:00 Debian Importer Fixing VCID-gqrn-ek3y-hbg1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:17.952463+00:00 Debian Importer Fixing VCID-bz74-1y1q-8qfc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:13.190057+00:00 Debian Importer Fixing VCID-zm59-us92-2bh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:47.298267+00:00 Debian Importer Fixing VCID-g4s8-7k7n-c3an https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:36.624555+00:00 Debian Importer Fixing VCID-c5zg-brhd-4ygg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:23.838650+00:00 Debian Importer Fixing VCID-sg6f-tksc-d3f5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:21.041114+00:00 Debian Importer Fixing VCID-yh48-k15t-gqcu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:20.235622+00:00 Debian Importer Fixing VCID-1t5g-b5jt-8yft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:11.508637+00:00 Debian Importer Fixing VCID-xbab-79ux-t3bn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:18.681275+00:00 Debian Importer Fixing VCID-7535-appn-5fhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:23.665692+00:00 Debian Importer Fixing VCID-ux6a-2384-suf9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:07.281671+00:00 Debian Importer Fixing VCID-74uy-aghm-bkhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:59.416859+00:00 Debian Importer Fixing VCID-tqpx-hedp-dfcb https://security-tracker.debian.org/tracker/data/json 38.1.0