<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:1854-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-06-04T06:54:13Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-06-04T06:54:13Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-06-04T06:54:13Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 78.10.2
- CVE-2021-29957: Fixed partial protection of inline OpenPGP message not indicated (bsc#1186198).
- CVE-2021-29956: Fixed Thunderbird stored OpenPGP secret keys without master password protection (bsc#1186199).
- CVE-2021-29951: Fixed Thunderbird Maintenance Service could have been started or stopped by domain users (bsc#1185633).
- CVE-2021-29950: Fixed logic issue potentially leaves key material unlocked (bsc#1185086).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2021-1854,SUSE-SLE-Product-WE-15-SP2-2021-1854,SUSE-SLE-Product-WE-15-SP3-2021-1854</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211854-1/</URL>
      <Description>Link for SUSE-SU-2021:1854-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-June/008933.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:1854-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185086</URL>
      <Description>SUSE Bug 1185086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185633</URL>
      <Description>SUSE Bug 1185633</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186198</URL>
      <Description>SUSE Bug 1186198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186199</URL>
      <Description>SUSE Bug 1186199</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29950/</URL>
      <Description>SUSE CVE CVE-2021-29950 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29951/</URL>
      <Description>SUSE CVE CVE-2021-29951 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29956/</URL>
      <Description>SUSE CVE CVE-2021-29956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29957/</URL>
      <Description>SUSE CVE CVE-2021-29957 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP2" CPE="cpe:/o:suse:sle-we:15:sp2">SUSE Linux Enterprise Workstation Extension 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP3" CPE="cpe:/o:suse:sle-we:15:sp3">SUSE Linux Enterprise Workstation Extension 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-78.10.2-8.27.1">
      <FullProductName ProductID="MozillaThunderbird-78.10.2-8.27.1">MozillaThunderbird-78.10.2-8.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-78.10.2-8.27.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-78.10.2-8.27.1">MozillaThunderbird-translations-common-78.10.2-8.27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-78.10.2-8.27.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-78.10.2-8.27.1">MozillaThunderbird-translations-other-78.10.2-8.27.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-78.10.2-8.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1">MozillaThunderbird-78.10.2-8.27.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-78.10.2-8.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1">MozillaThunderbird-translations-common-78.10.2-8.27.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-78.10.2-8.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1">MozillaThunderbird-translations-other-78.10.2-8.27.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-78.10.2-8.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1">MozillaThunderbird-78.10.2-8.27.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-78.10.2-8.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1">MozillaThunderbird-translations-common-78.10.2-8.27.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-78.10.2-8.27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1">MozillaThunderbird-translations-other-78.10.2-8.27.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state. This vulnerability affects Thunderbird &lt; 78.8.1.</Note>
    </Notes>
    <CVE>CVE-2021-29950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211854-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29950.html</URL>
        <Description>CVE-2021-29950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185086</URL>
        <Description>SUSE Bug 1185086</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service. *Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 78.10.1, Firefox &lt; 87, and Firefox ESR &lt; 78.10.1.</Note>
    </Notes>
    <CVE>CVE-2021-29951</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.4</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:P/I:P/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>3.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211854-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29951.html</URL>
        <Description>CVE-2021-29951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185633</URL>
        <Description>SUSE Bug 1185633</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird &lt; 78.10.2.</Note>
    </Notes>
    <CVE>CVE-2021-29956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.3</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>3.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211854-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29956.html</URL>
        <Description>CVE-2021-29956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186199</URL>
        <Description>SUSE Bug 1186199</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected. This vulnerability affects Thunderbird &lt; 78.10.2.</Note>
    </Notes>
    <CVE>CVE-2021-29957</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-common-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP2:MozillaThunderbird-translations-other-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-common-78.10.2-8.27.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP3:MozillaThunderbird-translations-other-78.10.2-8.27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.3</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:N/I:P/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>3.1</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211854-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29957.html</URL>
        <Description>CVE-2021-29957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186198</URL>
        <Description>SUSE Bug 1186198</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
