ArchLinux: 202105-29: thunderbird: multiple issues
Summary
- CVE-2021-29956 (information disclosure)
OpenPGP secret keys that were imported using Thunderbird version 78.8.1
up to version 78.10.1 were stored unencrypted on the user's local disk.
The master password protection was inactive for those keys. Version
78.10.2 will restore the protection mechanism for newly imported keys,
and will automatically protect keys that had been imported using
affected Thunderbird versions. This vulnerability affects Thunderbird <
78.10.2.
- CVE-2021-29957 (content spoofing)
If a MIME encoded email contains an OpenPGP inline signed or encrypted
message part, but also contains an additional unprotected part,
Thunderbird did not indicate that only parts of the message are
protected. This vulnerability affects Thunderbird < 78.10.2.
Resolution
Upgrade to 78.10.2-1.
# pacman -Syu "thunderbird>=78.10.2-1"
The problems have been fixed upstream in version 78.10.2.
References
https://www.mozilla.org/en-US/security/advisories/mfsa2021-22/ https://bugzilla.mozilla.org/show_bug.cgi?id=1710290 https://bugzilla.mozilla.org/show_bug.cgi?id=1673241 https://security.archlinux.org/CVE-2021-29956 https://security.archlinux.org/CVE-2021-29957
Workaround
None.