TIP: Click on subject to list as thread! ANSI
echo: internet
to: All
from: August Abolins
date: 2021-07-20 09:47:00
subject: vulnerability in the way

Mozilla announced a vulnerability in the way its Thunderbird email client
implements OpenPGP. If you use Thunderbird to manage your PGP keys, you should
update to the latest version of Thunderbird. 

https://www.mozilla.org/en-US/security/advisories/mfsa2021-22/#CVE-2021-29956?u
tm_campaign=ww-all-2a-generic-coms_email-g_eng-newsletter&utm_source=proton_use
rs_mail&utm_medium=email&utm_content=2021_-_june

https://tinyurl.com/sy4yudx3

Here are the two concerns for convenience:

[1]

CVE-2021-29957: Partial protection of inline OpenPGP message not indicated

Description

If a MIME encoded email contains an OpenPGP inline signed or encrypted message
part, but also contains an additional unprotected part, Thunderbird did not
indicate that only parts of the message are protected.

[2]

CVE-2021-29956: Thunderbird stored OpenPGP secret keys without master password
protection

Description

OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to
version 78.10.1 were stored unencrypted on the user's local disk. The master
password protection was inactive for those keys. Version 78.10.2 will restore
the protection mechanism for newly imported keys, and will automatically
protect keys that had been imported using affected Thunderbird versions.
--- SBBSecho 3.14-Linux
                                         
* Origin: The Rusty MailBox - Penticton, BC Canada (1:153/757.2)

SOURCE: echomail via QWK@pharcyde.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.