Arch Linux Security Advisory ASA-202105-29
==========================================

Severity: Low
Date    : 2021-05-25
CVE-ID  : CVE-2021-29956 CVE-2021-29957
Package : thunderbird
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1964

Summary
=======

The package thunderbird before version 78.10.2-1 is vulnerable to
multiple issues including content spoofing and information disclosure.

Resolution
==========

Upgrade to 78.10.2-1.

# pacman -Syu "thunderbird>=78.10.2-1"

The problems have been fixed upstream in version 78.10.2.

Workaround
==========

None.

Description
===========

- CVE-2021-29956 (information disclosure)

OpenPGP secret keys that were imported using Thunderbird version 78.8.1
up to version 78.10.1 were stored unencrypted on the user's local disk.
The master password protection was inactive for those keys. Version
78.10.2 will restore the protection mechanism for newly imported keys,
and will automatically protect keys that had been imported using
affected Thunderbird versions. This vulnerability affects Thunderbird <
78.10.2.

- CVE-2021-29957 (content spoofing)

If a MIME encoded email contains an OpenPGP inline signed or encrypted
message part, but also contains an additional unprotected part,
Thunderbird did not indicate that only parts of the message are
protected. This vulnerability affects Thunderbird < 78.10.2.

Impact
======

OpenPGP secret keys were store unencrypted on disk, allowing for
potential local exfiltration. Additionally, a remote attacker could
inject unprotected parts into OpenPGP signed or encrypted messages in
order to spoof content.

References
==========

https://www.mozilla.org/security/advisories/mfsa2021-22/
https://bugzilla.mozilla.org/show_bug.cgi?id=1710290
https://bugzilla.mozilla.org/show_bug.cgi?id=1673241
https://security.archlinux.org/CVE-2021-29956
https://security.archlinux.org/CVE-2021-29957