Aggregator

USN-7731-1: KMail vulnerabilities

2 weeks 1 day ago
Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, and Jörg Schwenk discovered that KMail could be made to leak the plaintext of S/MIME encrypted emails when retrieving external content in emails. Under certain configurations, if a user were tricked into opening a specially crafted email, an attacker could possibly use this issue to obtain the plaintext of an encrypted email. This update mitigates the issue by preventing KMail from automatically loading external content. This issue only affected Ubuntu 18.04 LTS. (CVE-2017-17689) It was discovered that KMail could be made to attach files to an email without the user's knowledge. If a user were tricked into sending an email created by a specially crafted "mailto" link, an attacker could possibly use this issue to obtain sensitive files. (CVE-2020-11880)

USN-7725-3: Linux kernel vulnerabilities

2 weeks 1 day ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Overlay file system; - Network traffic control; (CVE-2025-21887, CVE-2024-57996, CVE-2025-38350, CVE-2025-37752)

USN-7730-1: PIM Messagelib vulnerabilities

2 weeks 1 day ago
Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, and Jörg Schwenk discovered that PIM Messagelib could be made to leak the plaintext of S/MIME encrypted emails when retrieving external content in emails. Under certain configurations, if a user were tricked into opening a specially crafted email using an application linked against PIM Messagelib, an attacker could possibly use this issue to obtain the plaintext of an encrypted email. This update mitigates the issue by preventing automatic loading of external content. (CVE-2017-17689) Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, and Jörg Schwenk discovered that PIM Messagelib could be made to leak the plaintext of S/MIME or PGP encrypted emails. If a user were tricked into replying to a specially crafted email using an application linked against PIM Messagelib, an attacker could possibly use this issue to obtain the plaintext of an encrypted email. (CVE-2019-10732)