{"id":229440,"date":"2020-03-13T00:11:00","date_gmt":"2020-03-12T23:11:00","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=229440"},"modified":"2020-08-30T10:58:36","modified_gmt":"2020-08-30T08:58:36","slug":"thunderbird-68-6-0-freigegeben","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2020\/03\/13\/thunderbird-68-6-0-freigegeben\/","title":{"rendered":"Thunderbird 68.6.0 freigegeben"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2012\/07\/Mozilla.jpg\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/?p=13641\" target=\"_blank\" rel=\"noopener noreferrer\">English<\/a>]Die Entwickler des E-Mail-Client Thunderbird haben zum 12.3.2020 die Version 68.6.0 freigegeben. Es handelt sich um ein Wartungsupdate (keine Sicherheitsfixes) f\u00fcr die 68er-Hauptversion des E-Mail-Clients.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg02.met.vgwort.de\/na\/a0cff39c417f4b16906af91c49efc7de\" alt=\"\" width=\"1\" height=\"1\" \/>Der Hinweis kam bereits von Ralf in <a href=\"https:\/\/borncity.com\/blog\/2020\/02\/12\/thunderbird-68-5-freigegeben\/#comment-86675\">diesem Kommentar<\/a> (danke daf\u00fcr). Ich habe nat\u00fcrlich sofort getestet, und habe die neue Version angeboten bekommen. Bei einem schnellen Check hat sich das Update problemlos installiert und ich konnte auf die Schnelle keine Fehler erkennen.<\/p>\n<h2>Neuerungen und Fehlerbehebungen<\/h2>\n<p>Gem\u00e4\u00df den <a href=\"https:\/\/www.thunderbird.net\/en-US\/thunderbird\/68.6.0\/releasenotes\/\">Release-Notes<\/a> zeigt der neue Thunderbird ein Popup beim Start mit einem neuen Profil. Zudem bietet der Thunderbird jetzt Teil-Updates, die zu kleineren Downloads f\u00fchren. In der neuen Version des Thunderbird hat man folgende Fehlerkorrekturen vorgenommen:<\/p>\n<ul>\n<li>Die Suche in Nachrichtentexten f\u00fchrte unter Umst\u00e4nden zu falschen Ergebnissen in quoted-printable encodierten HTML-Body-Texten.<\/li>\n<li>\"Neue Nachrichten f\u00fcr alle Konten erhalten\" funktioniert nicht f\u00fcr OAuth2-authentifizierte IMAP-Konten.<\/li>\n<\/ul>\n<p>Falls es nach dem Upgrade von Version 60 auf die aktuelle Version Probleme mit Lightning (Kalender-Add-On) gibt, sollte <a href=\"https:\/\/support.mozilla.org\/en-US\/kb\/calendar-updates-issues-thunderbird\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Support-Artikel<\/a> Hilfestellung liefern.<\/p>\n<h2>Sicherheitpatches<\/h2>\n<p>Die Readme gibt zudem an, dass es Sicherheitsfixes gegeben habe. Diese sind auf <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Seite<\/a> aufgef\u00fchrt.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/#CVE-2020-6805\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-6805: Use-after-free when removing data about origins<\/a>: When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash<\/li>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/#CVE-2020-6806\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-6806: BodyStream::OnInputStreamReady was missing protections against state confusion<\/a>: By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash.<\/li>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/#CVE-2020-6807\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-6807: Use-after-free in cubeb during stream destruction<\/a>: When a device was changed while a stream was about to be destroyed, the <code>stream-reinit<\/code> task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash.<\/li>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/#CVE-2020-6811\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-6811: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection<\/a>: The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.<\/li>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/#CVE-2019-20503\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-20503: Out of bounds reads in sctp_load_addresses_from_init<\/a>: The inputs to <code>sctp_load_addresses_from_init<\/code> are verified by <code>sctp_arethere_unrecognized_parameters<\/code>; however, the two functions handled parameter bounds differently, resulting in out of bounds reads when parameters are partially outside a chunk.<\/li>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/#CVE-2020-6812\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-6812: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission<\/a>: The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'.<\/li>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/#CVE-2020-6814\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-6814: Memory safety bugs fixed in Thunderbird 68.6<\/a>: Mozilla developers Byron Campen, Jason Kratzer, and Christian Holler reported memory safety bugs present in Thunderbird 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<\/li>\n<\/ul>\n<p>Mehrere Fixes besitzen die Einstufung 'hoch', w\u00e4hrend weitere Fixes als moderat eingestuft wurden. Details lassen sich bei Bedarf auf <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-10\/\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Seite<\/a> nachlesen.<\/p>\n<h2>Systemvoraussetzungen<\/h2>\n<p>Die Systemvoraussetzungen f\u00fcr die verschiedenen Betriebssystemversionen (siehe <a href=\"https:\/\/www.thunderbird.net\/en-US\/thunderbird\/68.0\/system-requirements\/\" target=\"_blank\" rel=\"noopener noreferrer\">auch<\/a>):<\/p>\n<ul>\n<li>Windows: Windows 7, Windows Server 2008 R2 oder h\u00f6her<\/li>\n<li>Mac: Mac OS X 10.9 oder h\u00f6her<\/li>\n<li>Linux: GTK+ 3.4 oder h\u00f6her<\/li>\n<\/ul>\n<p>Den Download gibt es <a href=\"https:\/\/www.thunderbird.net\/de\/\" target=\"_blank\" rel=\"noopener noreferrer\">hier<\/a>. Der Thunderbird ist \u00fcbrigens kostenlos.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Die Entwickler des E-Mail-Client Thunderbird haben zum 12.3.2020 die Version 68.6.0 freigegeben. Es handelt sich um ein Wartungsupdate (keine Sicherheitsfixes) f\u00fcr die 68er-Hauptversion des E-Mail-Clients.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,7459,214,185],"tags":[4318,4315],"class_list":["post-229440","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-software","category-thunderbird","category-update","tag-thunderbird","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/229440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=229440"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/229440\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=229440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=229440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=229440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}