Subj : vulnerability in the way its Thunderbird email client implements OpenPG
To   : All
From : August Abolins
Date : Tue Jul 20 2021 09:47 am

Mozilla announced a vulnerability in the way its Thunderbird email client
implements OpenPGP. If you use Thunderbird to manage your PGP keys, you should
update to the latest version of Thunderbird.

https://www.mozilla.org/en-US/security/advisories/mfsa2021-22/#CVE-2021-29956?u
tm_campaign=ww-all-2a-generic-coms_email-g_eng-newsletter&utm_source=proton_use
rs_mail&utm_medium=email&utm_content=2021_-_june

https://tinyurl.com/sy4yudx3

Here are the two concerns for convenience:

[1]

CVE-2021-29957: Partial protection of inline OpenPGP message not indicated

Description

If a MIME encoded email contains an OpenPGP inline signed or encrypted message
part, but also contains an additional unprotected part, Thunderbird did not
indicate that only parts of the message are protected.

[2]

CVE-2021-29956: Thunderbird stored OpenPGP secret keys without master password
protection

Description

OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to
version 78.10.1 were stored unencrypted on the user's local disk. The master
password protection was inactive for those keys. Version 78.10.2 will restore
the protection mechanism for newly imported keys, and will automatically
protect keys that had been imported using affected Thunderbird versions.
--- SBBSecho 3.14-Linux
* Origin: The Rusty MailBox - Penticton, BC Canada (1:153/757.2)