If a user saved passwords before Thunderbird 60 and then later set a master
password, an unencrypted copy of these passwords is still accessible. This
is because the older stored password file was not deleted when the data was
copied to a new format starting in Thunderbird 60. The new master password
is added only on the new file. This could allow the exposure of stored
password data outside of user expectations. This vulnerability affects
Thunderbird < 68.5.
Upstream:released (68.5.0)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1:68.7.0+build1-0ubuntu0.16.04.2)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:68.7.0+build1-0ubuntu0.18.04.1)
Ubuntu 19.10 (Eoan Ermine):released (1:68.7.0+build1-0ubuntu0.19.10.1)
Ubuntu 20.04 (Focal Fossa):released (1:68.5.0+build1-0ubuntu1)
More Information

Updated: 2020-04-21 23:23:26 UTC (commit d561fac80febc8c3f3b3fa9e461482b7aca4e740)