CVE-2021-23992

NameCVE-2021-23992
DescriptionThunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2632-1, DSA-4897-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
thunderbird (PTS)stretch1:68.10.0-1~deb9u1vulnerable
stretch (security)1:78.12.0-1~deb9u1fixed
buster1:78.6.0-1~deb10u1vulnerable
buster (security)1:78.12.0-1~deb10u1fixed
bullseye, sid1:78.12.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
thunderbirdsourcestretch1:78.10.0-1~deb9u1DLA-2632-1
thunderbirdsourcebuster1:78.10.0-1~deb10u1DSA-4897-1
thunderbirdsource(unstable)1:78.10.0-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2021-13/#CVE-2021-23992

Search for package or bug name: Reporting problems