CVE-2021-29956

NameCVE-2021-29956
DescriptionOpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird < 78.10.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2679-1, DSA-4927-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
thunderbird (PTS)stretch1:68.10.0-1~deb9u1vulnerable
stretch (security)1:78.14.0-1~deb9u1fixed
buster1:78.6.0-1~deb10u1vulnerable
buster (security)1:78.14.0-1~deb10u1fixed
bullseye1:78.12.0-1fixed
bullseye (security)1:78.14.0-1~deb11u1fixed
bookworm, sid1:78.14.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
thunderbirdsourcestretch1:78.11.0-1~deb9u1DLA-2679-1
thunderbirdsourcebuster1:78.11.0-1~deb10u1DSA-4927-1
thunderbirdsource(unstable)1:78.10.2-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2021-22/#CVE-2021-29956

Search for package or bug name: Reporting problems