Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2021-13/#CVE-2021-23992
Acknowledgments: Name: the Mozilla project Upstream: Neal Walfield
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:1190 https://access.redhat.com/errata/RHSA-2021:1190
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1193 https://access.redhat.com/errata/RHSA-2021:1193
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:1192 https://access.redhat.com/errata/RHSA-2021:1192
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-23992
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:1201 https://access.redhat.com/errata/RHSA-2021:1201