Firefox 77, Tor Browser 9.5 Released With Patches, Security Improvements

Firefox 77 and Tor Browser 9.5 were released this week with patches for a variety of vulnerabilities, including several rated high severity.


Mozilla’s browser arrived with a total of 8 security fixes, including 5 that address high severity issues.


The most important of these is a patch for CVE-2020-12399, a timing attack on DSA signatures in the NSS library: due to timing differences when performing DSA signatures, an adversary could devise an attack and leak private keys.


Another high risk flaw addressed in this release was a use-after-free in SharedWorkerService (CVE-2020-12405), triggered by a race condition that could occur when browsing a malicious page. Additionally, Mozilla patched a JavaScript type confusion with NativeTypes (CVE-2020-12406).


A medium risk issue was patched in Firefox 77 this week, where, under certain conditions, arbitrary GPU memory would be leaked to the visible screen. Two low severity bugs were fixed, both URL spoofing issues.


Mozilla also addressed a series of high severity memory safety bugs in both Firefox 77 and Firefox ESR 68.9. The newly released Tor Browser 9.5 is based on the latter.


In addition to the security fixes in Firefox ESR 68.9 (addressing the aforementioned high risk flaws), the latest Tor release brings several other security improvements, such as the option to select the .onion version of a visited website, where one exists, or onion services administrators’ ability to set a pair of keys for access control and authentication to their website.


Starting with Tor Browser 9.5, if Onion Location is enabled, users will be informed when ..

Support the originator by clicking the read the rest link below.