GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00024.html
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
http://seclists.org/fulldisclosure/2019/Apr/38
http://www.openwall.com/lists/oss-security/2019/04/30/4
https://bugzilla.gnome.org/show_bug.cgi?id=796424
https://github.com/RUB-NDS/Johnny-You-Are-Fired
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
https://lists.debian.org/debian-lts-announce/2019/04/msg00027.html
https://seclists.org/bugtraq/2019/Jun/7
Source: MITRE
Published: 2019-02-11
Updated: 2019-06-10
Type: CWE-347
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact Score: 2.9
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Impact Score: 3.6
Exploitability Score: 2.8
Severity: MEDIUM