Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-29950
Vulnerability from cvelistv5
Published
2021-06-24 13:18
Modified
2024-08-03 22:18
Severity ?
EPSS score ?
Summary
Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.
References
▼ | URL | Tags | |
---|---|---|---|
security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1673239 | Exploit, Vendor Advisory | |
security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2021-17/ | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=1673239 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2021-17/ | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Mozilla | Thunderbird |
Version: unspecified < 78.8.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T22:18:03.200Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.mozilla.org/security/advisories/mfsa2021-17/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Thunderbird", vendor: "Mozilla", versions: [ { lessThan: "78.8.1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", }, ], problemTypes: [ { descriptions: [ { description: "Logic issue potentially leaves key material unlocked", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-24T13:18:46", orgId: "f16b083a-5664-49f3-a51e-8d479e5ed7fe", shortName: "mozilla", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.mozilla.org/security/advisories/mfsa2021-17/", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@mozilla.org", ID: "CVE-2021-29950", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Thunderbird", version: { version_data: [ { version_affected: "<", version_value: "78.8.1", }, ], }, }, ], }, vendor_name: "Mozilla", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Logic issue potentially leaves key material unlocked", }, ], }, ], }, references: { reference_data: [ { name: "https://www.mozilla.org/security/advisories/mfsa2021-17/", refsource: "MISC", url: "https://www.mozilla.org/security/advisories/mfsa2021-17/", }, { name: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", refsource: "MISC", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f16b083a-5664-49f3-a51e-8d479e5ed7fe", assignerShortName: "mozilla", cveId: "CVE-2021-29950", datePublished: "2021-06-24T13:18:46", dateReserved: "2021-04-01T00:00:00", dateUpdated: "2024-08-03T22:18:03.200Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-29950\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2021-06-24T14:15:09.917\",\"lastModified\":\"2024-11-21T06:02:02.663\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.\"},{\"lang\":\"es\",\"value\":\"Thunderbird desprotege una clave secreta OpenPGP antes de usarla para una tarea de descifrado, firma o importación de claves. Si la tarea ejecuta un fallo, la clave secreta puede permanecer en la memoria en su estado desprotegido. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 78.8.1\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"78.8.1\",\"matchCriteriaId\":\"206828C7-B9AA-41C1-80F2-E1DA86F0BDD8\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1673239\",\"source\":\"security@mozilla.org\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2021-17/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1673239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2021-17/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}", }, }
ghsa-4ghf-pq62-2jfh
Vulnerability from github
Published
2022-05-24 19:06
Modified
2022-05-24 19:06
Details
Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.
{ affected: [], aliases: [ "CVE-2021-29950", ], database_specific: { cwe_ids: [ "CWE-312", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-06-24T14:15:00Z", severity: "HIGH", }, details: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", id: "GHSA-4ghf-pq62-2jfh", modified: "2022-05-24T19:06:09Z", published: "2022-05-24T19:06:09Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, { type: "WEB", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, { type: "WEB", url: "https://www.mozilla.org/security/advisories/mfsa2021-17", }, ], schema_version: "1.4.0", severity: [], }
opensuse-su-2021:1854-1
Vulnerability from csaf_opensuse
Published
2021-07-10 17:54
Modified
2021-07-10 17:54
Summary
Security update for MozillaThunderbird
Notes
Title of the patch
Security update for MozillaThunderbird
Description of the patch
This update for MozillaThunderbird fixes the following issues:
- Mozilla Thunderbird 78.10.2
- CVE-2021-29957: Fixed partial protection of inline OpenPGP message not indicated (bsc#1186198).
- CVE-2021-29956: Fixed Thunderbird stored OpenPGP secret keys without master password protection (bsc#1186199).
- CVE-2021-29951: Fixed Thunderbird Maintenance Service could have been started or stopped by domain users (bsc#1185633).
- CVE-2021-29950: Fixed logic issue potentially leaves key material unlocked (bsc#1185086).
Patchnames
openSUSE-SLE-15.3-2021-1854
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for MozillaThunderbird", title: "Title of the patch", }, { category: "description", text: "This update for MozillaThunderbird fixes the following issues:\n\n- Mozilla Thunderbird 78.10.2\n- CVE-2021-29957: Fixed partial protection of inline OpenPGP message not indicated (bsc#1186198).\n- CVE-2021-29956: Fixed Thunderbird stored OpenPGP secret keys without master password protection (bsc#1186199).\n- CVE-2021-29951: Fixed Thunderbird Maintenance Service could have been started or stopped by domain users (bsc#1185633).\n- CVE-2021-29950: Fixed logic issue potentially leaves key material unlocked (bsc#1185086).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2021-1854", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1854-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1854-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FGBREHMZI3UK2I6TGJZ75S4VSJHXVNF/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1854-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FGBREHMZI3UK2I6TGJZ75S4VSJHXVNF/", }, { category: "self", summary: "SUSE Bug 1185086", url: "https://bugzilla.suse.com/1185086", }, { category: "self", summary: "SUSE Bug 1185633", url: "https://bugzilla.suse.com/1185633", }, { category: "self", summary: "SUSE Bug 1186198", url: "https://bugzilla.suse.com/1186198", }, { category: "self", summary: "SUSE Bug 1186199", url: "https://bugzilla.suse.com/1186199", }, { category: "self", summary: "SUSE CVE CVE-2021-29950 page", url: "https://www.suse.com/security/cve/CVE-2021-29950/", }, { category: "self", summary: "SUSE CVE CVE-2021-29951 page", url: "https://www.suse.com/security/cve/CVE-2021-29951/", }, { category: "self", summary: "SUSE CVE CVE-2021-29956 page", url: "https://www.suse.com/security/cve/CVE-2021-29956/", }, { category: "self", summary: "SUSE CVE CVE-2021-29957 page", url: "https://www.suse.com/security/cve/CVE-2021-29957/", }, ], title: "Security update for MozillaThunderbird", tracking: { current_release_date: "2021-07-10T17:54:23Z", generator: { date: "2021-07-10T17:54:23Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1854-1", initial_release_date: "2021-07-10T17:54:23Z", revision_history: [ { date: "2021-07-10T17:54:23Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.aarch64", product: { name: "MozillaThunderbird-78.10.2-8.27.1.aarch64", product_id: "MozillaThunderbird-78.10.2-8.27.1.aarch64", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.ppc64le", product: { name: "MozillaThunderbird-78.10.2-8.27.1.ppc64le", product_id: "MozillaThunderbird-78.10.2-8.27.1.ppc64le", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.s390x", product: { name: "MozillaThunderbird-78.10.2-8.27.1.s390x", product_id: "MozillaThunderbird-78.10.2-8.27.1.s390x", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.x86_64", product: { name: "MozillaThunderbird-78.10.2-8.27.1.x86_64", product_id: "MozillaThunderbird-78.10.2-8.27.1.x86_64", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-78.10.2-8.27.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", }, product_reference: "MozillaThunderbird-78.10.2-8.27.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-78.10.2-8.27.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", }, product_reference: "MozillaThunderbird-78.10.2-8.27.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-78.10.2-8.27.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", }, product_reference: "MozillaThunderbird-78.10.2-8.27.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-78.10.2-8.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-78.10.2-8.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", }, product_reference: "MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", }, product_reference: "MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", }, product_reference: "MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", }, product_reference: "MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", }, product_reference: "MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", }, product_reference: "MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-29950", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29950", }, ], notes: [ { category: "general", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29950", url: "https://www.suse.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "SUSE Bug 1185086 for CVE-2021-29950", url: "https://bugzilla.suse.com/1185086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-07-10T17:54:23Z", details: "moderate", }, ], title: "CVE-2021-29950", }, { cve: "CVE-2021-29951", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29951", }, ], notes: [ { category: "general", text: "The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service. *Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 78.10.1, Firefox < 87, and Firefox ESR < 78.10.1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29951", url: "https://www.suse.com/security/cve/CVE-2021-29951", }, { category: "external", summary: "SUSE Bug 1185633 for CVE-2021-29951", url: "https://bugzilla.suse.com/1185633", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-07-10T17:54:23Z", details: "low", }, ], title: "CVE-2021-29951", }, { cve: "CVE-2021-29956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29956", }, ], notes: [ { category: "general", text: "OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird < 78.10.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29956", url: "https://www.suse.com/security/cve/CVE-2021-29956", }, { category: "external", summary: "SUSE Bug 1186199 for CVE-2021-29956", url: "https://bugzilla.suse.com/1186199", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-07-10T17:54:23Z", details: "low", }, ], title: "CVE-2021-29956", }, { cve: "CVE-2021-29957", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29957", }, ], notes: [ { category: "general", text: "If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected. This vulnerability affects Thunderbird < 78.10.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29957", url: "https://www.suse.com/security/cve/CVE-2021-29957", }, { category: "external", summary: "SUSE Bug 1186198 for CVE-2021-29957", url: "https://bugzilla.suse.com/1186198", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", "openSUSE Leap 15.3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-07-10T17:54:23Z", details: "low", }, ], title: "CVE-2021-29957", }, ], }
fkie_cve-2021-29950
Vulnerability from fkie_nvd
Published
2021-06-24 14:15
Modified
2024-11-21 06:02
Severity ?
Summary
Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.
References
▼ | URL | Tags | |
---|---|---|---|
security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1673239 | Exploit, Vendor Advisory | |
security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2021-17/ | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=1673239 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2021-17/ | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mozilla | thunderbird | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", matchCriteriaId: "206828C7-B9AA-41C1-80F2-E1DA86F0BDD8", versionEndExcluding: "78.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", }, { lang: "es", value: "Thunderbird desprotege una clave secreta OpenPGP antes de usarla para una tarea de descifrado, firma o importación de claves. Si la tarea ejecuta un fallo, la clave secreta puede permanecer en la memoria en su estado desprotegido. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 78.8.1", }, ], id: "CVE-2021-29950", lastModified: "2024-11-21T06:02:02.663", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-24T14:15:09.917", references: [ { source: "security@mozilla.org", tags: [ "Exploit", "Vendor Advisory", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, { source: "security@mozilla.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2021-17/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2021-17/", }, ], sourceIdentifier: "security@mozilla.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-312", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
rhsa-2021_1192
Vulnerability from csaf_redhat
Published
2021-04-14 14:45
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1192", url: "https://access.redhat.com/errata/RHSA-2021:1192", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1192.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:38+00:00", generator: { date: "2024-11-22T16:42:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1192", initial_release_date: "2021-04-14T14:45:41+00:00", revision_history: [ { date: "2021-04-14T14:45:41+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T14:45:41+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.src", product: { name: "thunderbird-0:78.9.1-1.el7_9.src", product_id: "thunderbird-0:78.9.1-1.el7_9.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.x86_64", product: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64", product_id: "thunderbird-0:78.9.1-1.el7_9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el7_9?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product_id: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el7_9?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Workstation-7.9.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
rhsa-2021_1201
Vulnerability from csaf_redhat
Published
2021-04-14 17:12
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1201", url: "https://access.redhat.com/errata/RHSA-2021:1201", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1201.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:53+00:00", generator: { date: "2024-11-22T16:42:53+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1201", initial_release_date: "2021-04-14T17:12:27+00:00", revision_history: [ { date: "2021-04-14T17:12:27+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T17:12:27+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:53+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.2::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.src", product: { name: "thunderbird-0:78.9.1-1.el8_2.src", product_id: "thunderbird-0:78.9.1-1.el8_2.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
rhsa-2021:1201
Vulnerability from csaf_redhat
Published
2021-04-14 17:12
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1201", url: "https://access.redhat.com/errata/RHSA-2021:1201", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1201.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:53+00:00", generator: { date: "2024-11-22T16:42:53+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1201", initial_release_date: "2021-04-14T17:12:27+00:00", revision_history: [ { date: "2021-04-14T17:12:27+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T17:12:27+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:53+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.2::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.src", product: { name: "thunderbird-0:78.9.1-1.el8_2.src", product_id: "thunderbird-0:78.9.1-1.el8_2.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
RHSA-2021:1192
Vulnerability from csaf_redhat
Published
2021-04-14 14:45
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1192", url: "https://access.redhat.com/errata/RHSA-2021:1192", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1192.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:38+00:00", generator: { date: "2024-11-22T16:42:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1192", initial_release_date: "2021-04-14T14:45:41+00:00", revision_history: [ { date: "2021-04-14T14:45:41+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T14:45:41+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.src", product: { name: "thunderbird-0:78.9.1-1.el7_9.src", product_id: "thunderbird-0:78.9.1-1.el7_9.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.x86_64", product: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64", product_id: "thunderbird-0:78.9.1-1.el7_9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el7_9?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product_id: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el7_9?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Workstation-7.9.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
RHSA-2021:1193
Vulnerability from csaf_redhat
Published
2021-04-14 14:24
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1193", url: "https://access.redhat.com/errata/RHSA-2021:1193", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1193.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:46+00:00", generator: { date: "2024-11-22T16:42:46+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1193", initial_release_date: "2021-04-14T14:24:31+00:00", revision_history: [ { date: "2021-04-14T14:24:31+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T14:24:31+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:46+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.src", product: { name: "thunderbird-0:78.9.1-1.el8_3.src", product_id: "thunderbird-0:78.9.1-1.el8_3.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.src", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
rhsa-2021:1192
Vulnerability from csaf_redhat
Published
2021-04-14 14:45
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1192", url: "https://access.redhat.com/errata/RHSA-2021:1192", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1192.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:38+00:00", generator: { date: "2024-11-22T16:42:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1192", initial_release_date: "2021-04-14T14:45:41+00:00", revision_history: [ { date: "2021-04-14T14:45:41+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T14:45:41+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.src", product: { name: "thunderbird-0:78.9.1-1.el7_9.src", product_id: "thunderbird-0:78.9.1-1.el7_9.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.x86_64", product: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64", product_id: "thunderbird-0:78.9.1-1.el7_9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el7_9?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product_id: "thunderbird-0:78.9.1-1.el7_9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el7_9?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el7_9?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Client-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Server-optional-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.src", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", relates_to_product_reference: "7Workstation-7.9.Z", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", relates_to_product_reference: "7Workstation-7.9.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:45:41+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1192", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.9.1-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.9.1-1.el7_9.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
rhsa-2021_1190
Vulnerability from csaf_redhat
Published
2021-04-14 11:14
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1190", url: "https://access.redhat.com/errata/RHSA-2021:1190", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1190.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:30+00:00", generator: { date: "2024-11-22T16:42:30+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1190", initial_release_date: "2021-04-14T11:14:16+00:00", revision_history: [ { date: "2021-04-14T11:14:16+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T11:14:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:30+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.1::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.src", product: { name: "thunderbird-0:78.9.1-1.el8_1.src", product_id: "thunderbird-0:78.9.1-1.el8_1.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_1?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_1?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.src", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
rhsa-2021_1193
Vulnerability from csaf_redhat
Published
2021-04-14 14:24
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1193", url: "https://access.redhat.com/errata/RHSA-2021:1193", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1193.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:46+00:00", generator: { date: "2024-11-22T16:42:46+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1193", initial_release_date: "2021-04-14T14:24:31+00:00", revision_history: [ { date: "2021-04-14T14:24:31+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T14:24:31+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:46+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.src", product: { name: "thunderbird-0:78.9.1-1.el8_3.src", product_id: "thunderbird-0:78.9.1-1.el8_3.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.src", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
RHSA-2021:1201
Vulnerability from csaf_redhat
Published
2021-04-14 17:12
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1201", url: "https://access.redhat.com/errata/RHSA-2021:1201", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1201.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:53+00:00", generator: { date: "2024-11-22T16:42:53+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1201", initial_release_date: "2021-04-14T17:12:27+00:00", revision_history: [ { date: "2021-04-14T17:12:27+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T17:12:27+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:53+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.2::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.src", product: { name: "thunderbird-0:78.9.1-1.el8_2.src", product_id: "thunderbird-0:78.9.1-1.el8_2.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_2?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_2?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T17:12:27+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1201", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
RHSA-2021:1190
Vulnerability from csaf_redhat
Published
2021-04-14 11:14
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1190", url: "https://access.redhat.com/errata/RHSA-2021:1190", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1190.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:30+00:00", generator: { date: "2024-11-22T16:42:30+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1190", initial_release_date: "2021-04-14T11:14:16+00:00", revision_history: [ { date: "2021-04-14T11:14:16+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T11:14:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:30+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.1::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.src", product: { name: "thunderbird-0:78.9.1-1.el8_1.src", product_id: "thunderbird-0:78.9.1-1.el8_1.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_1?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_1?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.src", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
rhsa-2021:1193
Vulnerability from csaf_redhat
Published
2021-04-14 14:24
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1193", url: "https://access.redhat.com/errata/RHSA-2021:1193", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1193.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:46+00:00", generator: { date: "2024-11-22T16:42:46+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1193", initial_release_date: "2021-04-14T14:24:31+00:00", revision_history: [ { date: "2021-04-14T14:24:31+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T14:24:31+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:46+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.src", product: { name: "thunderbird-0:78.9.1-1.el8_3.src", product_id: "thunderbird-0:78.9.1-1.el8_3.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=aarch64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_3?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_3?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_3?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.src", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", relates_to_product_reference: "AppStream-8.3.0.Z.MAIN", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T14:24:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1193", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.9.1-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.9.1-1.el8_3.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
rhsa-2021:1190
Vulnerability from csaf_redhat
Published
2021-04-14 11:14
Modified
2024-11-22 16:42
Summary
Red Hat Security Advisory: thunderbird security update
Notes
Topic
An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.9.1.
Security Fix(es):
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.9.1.\n\nSecurity Fix(es):\n\n* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991)\n\n* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992)\n\n* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1190", url: "https://access.redhat.com/errata/RHSA-2021:1190", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1190.json", }, ], title: "Red Hat Security Advisory: thunderbird security update", tracking: { current_release_date: "2024-11-22T16:42:30+00:00", generator: { date: "2024-11-22T16:42:30+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1190", initial_release_date: "2021-04-14T11:14:16+00:00", revision_history: [ { date: "2021-04-14T11:14:16+00:00", number: "1", summary: "Initial version", }, { date: "2021-04-14T11:14:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T16:42:30+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.1::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.src", product: { name: "thunderbird-0:78.9.1-1.el8_1.src", product_id: "thunderbird-0:78.9.1-1.el8_1.src", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_1?arch=ppc64le", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "thunderbird-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird@78.9.1-1.el8_1?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debugsource@78.9.1-1.el8_1?arch=x86_64", }, }, }, { category: "product_version", name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product_id: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/thunderbird-debuginfo@78.9.1-1.el8_1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.src", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", product_id: "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", }, product_reference: "thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23991", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948393", }, ], notes: [ { category: "description", text: "If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23991", }, { category: "external", summary: "RHBZ#1948393", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948393", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23991", url: "https://www.cve.org/CVERecord?id=CVE-2021-23991", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23991", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23992", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948394", }, ], notes: [ { category: "description", text: "Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23992", }, { category: "external", summary: "RHBZ#1948394", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948394", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23992", url: "https://www.cve.org/CVERecord?id=CVE-2021-23992", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23992", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Neal Walfield", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-23993", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1948395", }, ], notes: [ { category: "description", text: "An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-23993", }, { category: "external", summary: "RHBZ#1948395", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1948395", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-23993", url: "https://www.cve.org/CVERecord?id=CVE-2021-23993", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-23993", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Tuan Vu Pham", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29949", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, discovery_date: "2021-04-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951872", }, ], notes: [ { category: "description", text: "When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Thunderbird might execute an alternative OTR library", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29949", }, { category: "external", summary: "RHBZ#1951872", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951872", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29949", url: "https://www.cve.org/CVERecord?id=CVE-2021-29949", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29949", }, ], release_date: "2021-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "Mozilla: Thunderbird might execute an alternative OTR library", }, { acknowledgments: [ { names: [ "the Mozilla project", ], }, { names: [ "Cure53", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2021-29950", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, discovery_date: "2021-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1951873", }, ], notes: [ { category: "description", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "Vulnerability description", }, { category: "summary", text: "Mozilla: Logic issue potentially leaves key material unlocked", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "RHBZ#1951873", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1951873", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-29950", url: "https://www.cve.org/CVERecord?id=CVE-2021-29950", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-29950", }, ], release_date: "2021-03-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-04-14T11:14:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", product_ids: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:1190", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.9.1-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.9.1-1.el8_1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "Mozilla: Logic issue potentially leaves key material unlocked", }, ], }
suse-su-2021:1854-1
Vulnerability from csaf_suse
Published
2021-06-04 06:54
Modified
2021-06-04 06:54
Summary
Security update for MozillaThunderbird
Notes
Title of the patch
Security update for MozillaThunderbird
Description of the patch
This update for MozillaThunderbird fixes the following issues:
- Mozilla Thunderbird 78.10.2
- CVE-2021-29957: Fixed partial protection of inline OpenPGP message not indicated (bsc#1186198).
- CVE-2021-29956: Fixed Thunderbird stored OpenPGP secret keys without master password protection (bsc#1186199).
- CVE-2021-29951: Fixed Thunderbird Maintenance Service could have been started or stopped by domain users (bsc#1185633).
- CVE-2021-29950: Fixed logic issue potentially leaves key material unlocked (bsc#1185086).
Patchnames
SUSE-2021-1854,SUSE-SLE-Product-WE-15-SP2-2021-1854,SUSE-SLE-Product-WE-15-SP3-2021-1854
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for MozillaThunderbird", title: "Title of the patch", }, { category: "description", text: "This update for MozillaThunderbird fixes the following issues:\n\n- Mozilla Thunderbird 78.10.2\n- CVE-2021-29957: Fixed partial protection of inline OpenPGP message not indicated (bsc#1186198).\n- CVE-2021-29956: Fixed Thunderbird stored OpenPGP secret keys without master password protection (bsc#1186199).\n- CVE-2021-29951: Fixed Thunderbird Maintenance Service could have been started or stopped by domain users (bsc#1185633).\n- CVE-2021-29950: Fixed logic issue potentially leaves key material unlocked (bsc#1185086).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-1854,SUSE-SLE-Product-WE-15-SP2-2021-1854,SUSE-SLE-Product-WE-15-SP3-2021-1854", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1854-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:1854-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20211854-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:1854-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008933.html", }, { category: "self", summary: "SUSE Bug 1185086", url: "https://bugzilla.suse.com/1185086", }, { category: "self", summary: "SUSE Bug 1185633", url: "https://bugzilla.suse.com/1185633", }, { category: "self", summary: "SUSE Bug 1186198", url: "https://bugzilla.suse.com/1186198", }, { category: "self", summary: "SUSE Bug 1186199", url: "https://bugzilla.suse.com/1186199", }, { category: "self", summary: "SUSE CVE CVE-2021-29950 page", url: "https://www.suse.com/security/cve/CVE-2021-29950/", }, { category: "self", summary: "SUSE CVE CVE-2021-29951 page", url: "https://www.suse.com/security/cve/CVE-2021-29951/", }, { category: "self", summary: "SUSE CVE CVE-2021-29956 page", url: "https://www.suse.com/security/cve/CVE-2021-29956/", }, { category: "self", summary: "SUSE CVE CVE-2021-29957 page", url: "https://www.suse.com/security/cve/CVE-2021-29957/", }, ], title: "Security update for MozillaThunderbird", tracking: { current_release_date: "2021-06-04T06:54:13Z", generator: { date: "2021-06-04T06:54:13Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:1854-1", initial_release_date: "2021-06-04T06:54:13Z", revision_history: [ { date: "2021-06-04T06:54:13Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.aarch64", product: { name: "MozillaThunderbird-78.10.2-8.27.1.aarch64", product_id: "MozillaThunderbird-78.10.2-8.27.1.aarch64", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.aarch64", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.i586", product: { name: "MozillaThunderbird-78.10.2-8.27.1.i586", product_id: "MozillaThunderbird-78.10.2-8.27.1.i586", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.i586", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.i586", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.i586", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.i586", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.i586", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.ppc64le", product: { name: "MozillaThunderbird-78.10.2-8.27.1.ppc64le", product_id: "MozillaThunderbird-78.10.2-8.27.1.ppc64le", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.ppc64le", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.s390x", product: { name: "MozillaThunderbird-78.10.2-8.27.1.s390x", product_id: "MozillaThunderbird-78.10.2-8.27.1.s390x", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.s390x", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "MozillaThunderbird-78.10.2-8.27.1.x86_64", product: { name: "MozillaThunderbird-78.10.2-8.27.1.x86_64", product_id: "MozillaThunderbird-78.10.2-8.27.1.x86_64", }, }, { category: "product_version", name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", product: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", product_id: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", }, }, { category: "product_version", name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", product: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", product_id: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP2", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-78.10.2-8.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-78.10.2-8.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-78.10.2-8.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-78.10.2-8.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", }, product_reference: "MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-29950", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29950", }, ], notes: [ { category: "general", text: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29950", url: "https://www.suse.com/security/cve/CVE-2021-29950", }, { category: "external", summary: "SUSE Bug 1185086 for CVE-2021-29950", url: "https://bugzilla.suse.com/1185086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-06-04T06:54:13Z", details: "moderate", }, ], title: "CVE-2021-29950", }, { cve: "CVE-2021-29951", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29951", }, ], notes: [ { category: "general", text: "The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service. *Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 78.10.1, Firefox < 87, and Firefox ESR < 78.10.1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29951", url: "https://www.suse.com/security/cve/CVE-2021-29951", }, { category: "external", summary: "SUSE Bug 1185633 for CVE-2021-29951", url: "https://bugzilla.suse.com/1185633", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-06-04T06:54:13Z", details: "low", }, ], title: "CVE-2021-29951", }, { cve: "CVE-2021-29956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29956", }, ], notes: [ { category: "general", text: "OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird < 78.10.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29956", url: "https://www.suse.com/security/cve/CVE-2021-29956", }, { category: "external", summary: "SUSE Bug 1186199 for CVE-2021-29956", url: "https://bugzilla.suse.com/1186199", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-06-04T06:54:13Z", details: "low", }, ], title: "CVE-2021-29956", }, { cve: "CVE-2021-29957", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29957", }, ], notes: [ { category: "general", text: "If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected. This vulnerability affects Thunderbird < 78.10.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29957", url: "https://www.suse.com/security/cve/CVE-2021-29957", }, { category: "external", summary: "SUSE Bug 1186198 for CVE-2021-29957", url: "https://bugzilla.suse.com/1186198", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-06-04T06:54:13Z", details: "low", }, ], title: "CVE-2021-29957", }, ], }
gsd-2021-29950
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.
Aliases
Aliases
{ GSD: { alias: "CVE-2021-29950", description: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", id: "GSD-2021-29950", references: [ "https://www.suse.com/security/cve/CVE-2021-29950.html", "https://access.redhat.com/errata/RHSA-2021:1201", "https://access.redhat.com/errata/RHSA-2021:1193", "https://access.redhat.com/errata/RHSA-2021:1192", "https://access.redhat.com/errata/RHSA-2021:1190", "https://ubuntu.com/security/CVE-2021-29950", "https://security.archlinux.org/CVE-2021-29950", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-29950", ], details: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", id: "GSD-2021-29950", modified: "2023-12-13T01:23:36.466295Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@mozilla.org", ID: "CVE-2021-29950", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Thunderbird", version: { version_data: [ { version_affected: "<", version_value: "78.8.1", }, ], }, }, ], }, vendor_name: "Mozilla", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Logic issue potentially leaves key material unlocked", }, ], }, ], }, references: { reference_data: [ { name: "https://www.mozilla.org/security/advisories/mfsa2021-17/", refsource: "MISC", url: "https://www.mozilla.org/security/advisories/mfsa2021-17/", }, { name: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", refsource: "MISC", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, ], }, }, "mozilla.org": { CVE_data_meta: { ASSIGNER: "security@mozilla.org", ID: "CVE-2021-29950", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Thunderbird", version: { version_data: [ { version_affected: "<", version_value: "78.8.1", }, ], }, }, ], }, vendor_name: "Mozilla", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Logic issue potentially leaves key material unlocked", }, ], }, ], }, references: { reference_data: [ { url: "https://www.mozilla.org/security/advisories/mfsa2021-17/", }, { url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "78.8.1", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@mozilla.org", ID: "CVE-2021-29950", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird < 78.8.1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-312", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", refsource: "MISC", tags: [ "Exploit", "Vendor Advisory", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1673239", }, { name: "https://www.mozilla.org/security/advisories/mfsa2021-17/", refsource: "MISC", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2021-17/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2021-06-25T20:12Z", publishedDate: "2021-06-24T14:15Z", }, }, }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.