[MFSA-2021-55] Security Vulnerabilities fixed in Thunderbird 91.4.1

Severity Moderate
Affected Packages 1
Fixed Packages 1
CVEs 2
  • CVE-2021-4126: OpenPGP signature status doesn't consider additional message content (moderate)
    When receiving an OpenPGP/MIME signed email message that contains an
    additional outer MIME message layer, for example a message footer added by a
    mailing list gateway, Thunderbird only considered the inner signed message for
    the signature validity. This gave the false impression that the additional contents
    were also covered by the digital signature. Starting with Thunderbird version 91.4.1,
    only the signature that belongs to the top level MIME part will be considered for
    the displayed status.

  • CVE-2021-44538: Matrix chat library libolm bundled with Thunderbird vulnerable to a buffer overflow (moderate)
    Thunderbird users who use the Matrix chat protocol were vulnerable
    to a buffer overflow in libolm, that an attacker may trigger by a crafted
    sequence of messages. The overflow content is partially controllable
    by the attacker and limited to ASCII spaces and digits.

Package Affected Version
pkg:mozilla/Thunderbird < 91.4.1
Package Fixed Version
pkg:mozilla/Thunderbird = 91.4.1
ID
MFSA-2021-55
Severity
moderate
URL
https://www.mozilla.org/en-US/security/advisories/mfsa2021-55
Published
2021-12-21T00:00:00
(2 years ago)
Modified
2021-12-21T00:00:00
(2 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:mozilla/Thunderbird Thunderbird < 91.4.1
Fixed pkg:mozilla/Thunderbird Thunderbird = 91.4.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...