{"id":9852,"date":"2019-05-24T00:02:00","date_gmt":"2019-05-23T22:02:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=9852"},"modified":"2024-10-05T18:25:16","modified_gmt":"2024-10-05T16:25:16","slug":"thunderbird-60-7-with-security-fixes","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/05\/24\/thunderbird-60-7-with-security-fixes\/","title":{"rendered":"Thunderbird 60.7 with Security fixes"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2012\/07\/Mozilla.jpg\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/faqs\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Mozilla's developers released an update of the email client Thunderbird to version 60.7 on May 21, 2019. This is a maintenance update which closes critical security gaps. Here is some information about it.<\/p>\n<p><!--more--><\/p>\n<p>German blog reader MCG mentioned within <a href=\"https:\/\/web.archive.org\/web\/20240101035917\/https:\/\/www.borncity.com\/blog\/2019\/05\/21\/firefox-67-und-60-7-0-esr\/\" target=\"_blank\" rel=\"noopener noreferrer\">this comment<\/a> (thanks). I checked it on my system. The update was detected during an update search on the Thunderbird Portable and installed without complaint. <\/p>\n<p><img decoding=\"async\" title=\"Thunderbird 60.7\" alt=\"Thunderbird 60.7\" src=\"https:\/\/i.imgur.com\/WVYUtmp.jpg\"><\/p>\n<p>The changes can be found in the <a href=\"https:\/\/www.thunderbird.net\/en-US\/thunderbird\/60.7.0\/releasenotes\/\" target=\"_blank\" rel=\"noopener noreferrer\">release notes<\/a>. The new version no longer focuses on the attachment area of a window of a new mail when files are attached to the mail using a keyboard shortcut. In addition, the following vulnerabilities, some of which are rated 'high', will be removed from <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/\" target=\"_blank\" rel=\"noopener noreferrer\">this security advisory<\/a>.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-9815\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-9816\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-9816: Type confusion with object groups and UnboxedObjects<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-9817\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-9817: Stealing of cross-domain images using canvas<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-9818\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-9818: Use-after-free in crash generation server<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-9819\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-9819: Compartment mismatch with fetch API<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-9820\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-11691\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11691: Use-after-free in XMLHttpRequest<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-11692\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11692: Use-after-free removing listeners in the event listener manager<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-11693\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-7317\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-7317: Use-after-free in png_image_free of libpng library<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-9797\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-9797: Cross-origin theft of images with createImageBitmap<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2018-18511\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-18511: Cross-origin theft of images with ImageBitmapRenderingContext<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-11694\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-11698\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-5798\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-5798: Out-of-bounds read in Skia<\/a>\n<li><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-15\/#CVE-2019-9800\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-9800: Memory safety bugs fixed in Firefox 67, Firefox ESR 60.7, and Thunderbird 60.7<\/a><\/li>\n<\/ul>\n<p>Thunderbird is available for Window: Windows 7, Windows Server 2008 R2 or later, macOS 10.9 or later and Linux: GTK+ 3.4 or later (<a href=\"https:\/\/www.thunderbird.net\/en-US\/thunderbird\/60.0\/system-requirements\/\" target=\"_blank\" rel=\"noopener noreferrer\">see<\/a>). <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Mozilla's developers released an update of the email client Thunderbird to version 60.7 on May 21, 2019. This is a maintenance update which closes critical security gaps. Here is some information about it.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,22],"tags":[69,1239,195],"class_list":["post-9852","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-update","tag-security","tag-thunderbird","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=9852"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9852\/revisions"}],"predecessor-version":[{"id":35477,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9852\/revisions\/35477"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=9852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=9852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=9852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}