CVE-2021-23992

NameCVE-2021-23992
DescriptionThunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2632-1, DSA-4897-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
thunderbird (PTS)buster1:91.12.0-1~deb10u1fixed
buster (security)1:115.10.1-1~deb10u1fixed
bullseye1:115.7.0-1~deb11u1fixed
bullseye (security)1:115.10.1-1~deb11u1fixed
bookworm1:115.7.0-1~deb12u1fixed
bookworm (security)1:115.10.1-1~deb12u1fixed
sid1:115.10.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
thunderbirdsourcestretch1:78.10.0-1~deb9u1DLA-2632-1
thunderbirdsourcebuster1:78.10.0-1~deb10u1DSA-4897-1
thunderbirdsource(unstable)1:78.10.0-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2021-13/#CVE-2021-23992

Search for package or bug name: Reporting problems