{"id":"USN-4936-1","summary":"thunderbird vulnerabilities","details":"Multiple security issues were discovered in Thunderbird. If a user were\ntricked into opening a specially crafted website in a browsing context,\nan attacker could potentially exploit these to cause a denial of service,\nobtain sensitive information, or execute arbitrary code. (CVE-2021-23968,\nCVE-2021-23969, CVE-2021-23973, CVE-2021-23978)\n\nIt was discovered that Thunderbird may keep key material in memory in some\ncircumstances. A local attacker could potentially exploit this to obtain\nprivate keys. (CVE-2021-29950)\n","modified":"2026-02-10T04:42:09Z","published":"2021-05-06T13:13:01Z","related":["UBUNTU-CVE-2021-23968","UBUNTU-CVE-2021-23969","UBUNTU-CVE-2021-23973","UBUNTU-CVE-2021-23978","UBUNTU-CVE-2021-29950"],"upstream":["CVE-2021-23968","CVE-2021-23969","CVE-2021-23973","CVE-2021-23978","CVE-2021-29950","UBUNTU-CVE-2021-23968","UBUNTU-CVE-2021-23969","UBUNTU-CVE-2021-23973","UBUNTU-CVE-2021-23978","UBUNTU-CVE-2021-29950"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4936-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23968"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23969"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23973"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23978"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29950"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:78.8.1+build1-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:78.8.1+build1-0ubuntu0.20.04.1"}]}],"versions":["1:68.1.2+build1-0ubuntu1","1:68.1.2+build1-0ubuntu2","1:68.2.1+build1-0ubuntu1","1:68.2.2+build1-0ubuntu1","1:68.3.0+build2-0ubuntu1","1:68.3.1+build1-0ubuntu2","1:68.4.1+build1-0ubuntu1","1:68.4.2+build2-0ubuntu1","1:68.5.0+build1-0ubuntu1","1:68.6.0+build2-0ubuntu1","1:68.7.0+build1-0ubuntu1","1:68.7.0+build1-0ubuntu2","1:68.8.0+build2-0ubuntu0.20.04.2","1:68.10.0+build1-0ubuntu0.20.04.1","1:78.7.1+build1-0ubuntu0.20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:78.8.1+build1-0ubuntu0.20.04.1","binary_name":"thunderbird"},{"binary_version":"1:78.8.1+build1-0ubuntu0.20.04.1","binary_name":"thunderbird-dev"},{"binary_version":"1:78.8.1+build1-0ubuntu0.20.04.1","binary_name":"thunderbird-gnome-support"},{"binary_version":"1:78.8.1+build1-0ubuntu0.20.04.1","binary_name":"thunderbird-mozsymbols"},{"binary_version":"1:78.8.1+build1-0ubuntu0.20.04.1","binary_name":"xul-ext-calendar-timezones"},{"binary_version":"1:78.8.1+build1-0ubuntu0.20.04.1","binary_name":"xul-ext-gdata-provider"},{"binary_version":"1:78.8.1+build1-0ubuntu0.20.04.1","binary_name":"xul-ext-lightning"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2021-23968","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23969","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-23973","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-23978","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-29950","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4936-1.json"}}],"schema_version":"1.7.3"}