Arch Linux Security Advisory ASA-202105-29 ========================================== Severity: Low Date : 2021-05-25 CVE-ID : CVE-2021-29956 CVE-2021-29957 Package : thunderbird Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-1964 Summary ======= The package thunderbird before version 78.10.2-1 is vulnerable to multiple issues including content spoofing and information disclosure. Resolution ========== Upgrade to 78.10.2-1. # pacman -Syu "thunderbird>=78.10.2-1" The problems have been fixed upstream in version 78.10.2. Workaround ========== None. Description =========== - CVE-2021-29956 (information disclosure) OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird < 78.10.2. - CVE-2021-29957 (content spoofing) If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected. This vulnerability affects Thunderbird < 78.10.2. Impact ====== OpenPGP secret keys were store unencrypted on disk, allowing for potential local exfiltration. Additionally, a remote attacker could inject unprotected parts into OpenPGP signed or encrypted messages in order to spoof content. References ========== https://www.mozilla.org/security/advisories/mfsa2021-22/ https://bugzilla.mozilla.org/show_bug.cgi?id=1710290 https://bugzilla.mozilla.org/show_bug.cgi?id=1673241 https://security.archlinux.org/CVE-2021-29956 https://security.archlinux.org/CVE-2021-29957