Mozilla announced a vulnerability in the way its Thunderbird email client implements OpenPGP. If you use Thunderbird to manage your PGP keys, you should update to the latest version of Thunderbird.
https://www.mozilla.org/en-US/security/advisories/mfsa2021-22/#CVE-2021-29956?u tm_campaign=ww-all-2a-generic-coms_email-g_eng-newsletter&utm_source=proton_use rs_mail&utm_medium=email&utm_content=2021_-_june
https://tinyurl.com/sy4yudx3
Here are the two concerns for convenience:
[1]
CVE-2021-29957: Partial protection of inline OpenPGP message not indicated
Description
If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected.
[2]
CVE-2021-29956: Thunderbird stored OpenPGP secret keys without master password protection
Description
OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions.
--- SBBSecho 3.14-Linux
* Origin: The Rusty MailBox - Penticton, BC Canada (1:153/757.2)