• vulnerability in the way its Thunderbird email client implements OpenPG

    From August Abolins@1:153/757.2 to All on Tue Jul 20 09:47:32 2021
    Mozilla announced a vulnerability in the way its Thunderbird email client implements OpenPGP. If you use Thunderbird to manage your PGP keys, you should update to the latest version of Thunderbird.

    https://www.mozilla.org/en-US/security/advisories/mfsa2021-22/#CVE-2021-29956?u tm_campaign=ww-all-2a-generic-coms_email-g_eng-newsletter&utm_source=proton_use rs_mail&utm_medium=email&utm_content=2021_-_june


    Here are the two concerns for convenience:


    CVE-2021-29957: Partial protection of inline OpenPGP message not indicated


    If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected.


    CVE-2021-29956: Thunderbird stored OpenPGP secret keys without master password protection


    OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions.
    --- SBBSecho 3.14-Linux
    * Origin: The Rusty MailBox - Penticton, BC Canada (1:153/757.2)