{"id":"USN-4995-2","summary":"thunderbird vulnerabilities","details":"USN-4995-1 fixed vulnerabilities in Thunderbird. This update provides\nthe corresponding updates for Ubuntu 18.04 LTS.\n\nOriginal advisory details:\n\n Multiple security issues were discovered in Thunderbird. If a user were\n tricked into opening a specially crafted website in a browsing context, an\n attacker could potentially exploit these to cause a denial of service,\n obtain sensitive information, spoof the UI, bypass security restrictions,\n or execute arbitrary code. (CVE-2021-23961, CVE-2021-23981,\n CVE-2021-23982, CVE-2021-23987, CVE-2021-23994, CVE-2021-23998,\n CVE-2021-23999, CVE-2021-29945, CVE-2021-29946, CVE-2021-29967)\n \n It was discovered that extensions could open popup windows with control\n of the window title in some circumstances. If a user were tricked into\n installing a specially crafted extension, an attacker could potentially\n exploit this to spoof a website and trick the user into providing\n credentials. (CVE-2021-23984)\n \n Multiple security issues were discovered in Thunderbird's OpenPGP\n integration. If a user were tricked into importing a specially crafted\n key in some circumstances, an attacker could potentially exploit this\n to cause a denial of service (inability to send encrypted email) or\n confuse the user. (CVE-2021-23991, CVE-2021-23992, CVE-2021-23993)\n \n A use-after-free was discovered when Responsive Design Mode was\n enabled. If a user were tricked into opening a specially crafted\n website with Responsive Design Mode enabled, an attacker could\n potentially exploit this to cause a denial of service, or execute\n arbitrary code. (CVE-2021-23995)\n \n It was discovered that Thunderbird mishandled ftp URLs with encoded\n newline characters. If a user were tricked into clicking on a specially\n crafted link, an attacker could potentially exploit this to send arbitrary\n FTP commands. (CVE-2021-24002)\n \n It was discovered that Thunderbird wrote signatures to disk and read them\n back during verification. A local attacker could potentially exploit this\n to replace the data with another signature file. (CVE-2021-29948)\n \n It was discovered that Thunderbird might load an alternative OTR\n library. If a user were tricked into copying a specially crafted\n library to one of Thunderbird's search paths, an attacker could\n potentially exploit this to execute arbitrary code. (CVE-2021-29949)\n \n It was discovered that secret keys imported into Thunderbird were\n stored unencrypted. A local attacker could potentially exploit this to\n obtain private keys. (CVE-2021-29956)\n \n It was discovered that Thunderbird did not indicate when an inline signed\n or encrypted message contained additional unprotected parts.\n (CVE-2021-29957)\n","modified":"2026-02-10T04:42:14Z","published":"2021-06-25T14:44:38Z","related":["UBUNTU-CVE-2021-23961","UBUNTU-CVE-2021-23981","UBUNTU-CVE-2021-23982","UBUNTU-CVE-2021-23984","UBUNTU-CVE-2021-23987","UBUNTU-CVE-2021-23991","UBUNTU-CVE-2021-23992","UBUNTU-CVE-2021-23993","UBUNTU-CVE-2021-23994","UBUNTU-CVE-2021-23995","UBUNTU-CVE-2021-23998","UBUNTU-CVE-2021-23999","UBUNTU-CVE-2021-24002","UBUNTU-CVE-2021-29945","UBUNTU-CVE-2021-29946","UBUNTU-CVE-2021-29948","UBUNTU-CVE-2021-29949","UBUNTU-CVE-2021-29956","UBUNTU-CVE-2021-29957","UBUNTU-CVE-2021-29967"],"upstream":["CVE-2021-23961","CVE-2021-23981","CVE-2021-23982","CVE-2021-23984","CVE-2021-23987","CVE-2021-23991","CVE-2021-23992","CVE-2021-23993","CVE-2021-23994","CVE-2021-23995","CVE-2021-23998","CVE-2021-23999","CVE-2021-24002","CVE-2021-29945","CVE-2021-29946","CVE-2021-29948","CVE-2021-29949","CVE-2021-29956","CVE-2021-29957","CVE-2021-29967","UBUNTU-CVE-2021-23961","UBUNTU-CVE-2021-23981","UBUNTU-CVE-2021-23982","UBUNTU-CVE-2021-23984","UBUNTU-CVE-2021-23987","UBUNTU-CVE-2021-23991","UBUNTU-CVE-2021-23992","UBUNTU-CVE-2021-23993","UBUNTU-CVE-2021-23994","UBUNTU-CVE-2021-23995","UBUNTU-CVE-2021-23998","UBUNTU-CVE-2021-23999","UBUNTU-CVE-2021-24002","UBUNTU-CVE-2021-29945","UBUNTU-CVE-2021-29946","UBUNTU-CVE-2021-29948","UBUNTU-CVE-2021-29949","UBUNTU-CVE-2021-29956","UBUNTU-CVE-2021-29957","UBUNTU-CVE-2021-29967"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4995-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23961"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23981"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23982"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23984"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23987"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23991"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23992"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23993"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23994"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23995"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23998"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23999"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-24002"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29945"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29946"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29948"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29949"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29956"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29957"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29967"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:78.11.0+build1-0ubuntu0.18.04.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:78.11.0+build1-0ubuntu0.18.04.2"}]}],"versions":["1:52.4.0+build1-0ubuntu2","1:52.6.0+build1-0ubuntu1","1:52.7.0+build1-0ubuntu1","1:52.8.0+build1-0ubuntu0.18.04.1","1:52.9.1+build3-0ubuntu0.18.04.1","1:60.2.1+build1-0ubuntu0.18.04.2","1:60.4.0+build2-0ubuntu0.18.04.1","1:60.5.1+build2-0ubuntu0.18.04.1","1:60.6.1+build2-0ubuntu0.18.04.1","1:60.7.0+build1-0ubuntu0.18.04.1","1:60.7.1+build1-0ubuntu0.18.04.1","1:60.7.2+build2-0ubuntu0.18.04.1","1:60.8.0+build1-0ubuntu0.18.04.1","1:60.9.0+build1-0ubuntu0.18.04.1","1:68.2.1+build1-0ubuntu0.18.04.1","1:68.2.2+build1-0ubuntu0.18.04.1","1:68.4.1+build1-0ubuntu0.18.04.1","1:68.7.0+build1-0ubuntu0.18.04.1","1:68.8.0+build2-0ubuntu0.18.04.2","1:68.10.0+build1-0ubuntu0.18.04.1","1:78.8.1+build1-0ubuntu0.18.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"thunderbird","binary_version":"1:78.11.0+build1-0ubuntu0.18.04.2"},{"binary_name":"thunderbird-dev","binary_version":"1:78.11.0+build1-0ubuntu0.18.04.2"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:78.11.0+build1-0ubuntu0.18.04.2"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:78.11.0+build1-0ubuntu0.18.04.2"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:78.11.0+build1-0ubuntu0.18.04.2"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:78.11.0+build1-0ubuntu0.18.04.2"},{"binary_name":"xul-ext-lightning","binary_version":"1:78.11.0+build1-0ubuntu0.18.04.2"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"id":"CVE-2021-23961","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23981","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23982","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23984","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23987","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23991","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23992","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23993","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23994","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23995","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23998","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23999","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-24002","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-29945","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-29946","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-29948","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-29949","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-29956","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-29957","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-29967","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4995-2.json"}}],"schema_version":"1.7.3"}