This release features important security updates to Firefox including the recently disclosed extension update vulnerability. All users should upgrade as soon as possible.
That vulnerability allows an attacker who is able to obtain a valid certificate for addons.mozilla.org to impersonate Mozilla's servers and to deliver a malicious extension update, e.g. for NoScript. This could lead to arbitrary code execution. Moreover, other built-in certificate pinnings are affected as well. Obtaining such a certificate is not an easy task, but it's within reach of powerful adversaries (e.g. nation states).
Thanks to everyone who helped investigating this bug and getting a bugfix release out as fast as possible.
We are currently building the alpha and hardened bundles (6.5a3 and 6.5a3-hardened) that will contain the fix for alpha/hardened channel users. We expect them to get released at the beginning of next week. Until then users are strongly encouraged to use Tor Browser 6.0.5.
Apart from fixing Firefox vulnerabilities this release comes with a new Tor stable version (0.2.8.7), an updated HTTPS-Everywhere (5.2.4), and fixes minor bugs.
Here is the full changelog since Tor Browser 6.0.4:
- All Platforms
- Windows
- Bug 19725: Remove old updater files left on disk after upgrade to 6.x
- Linux
- Bug 19725: Remove old updater files left on disk after upgrade to 6.x
- Android
- Bug 19706: Store browser data in the app home directory
- Build system
- All platforms
- Upgrade Go to 1.4.3
- All platforms
via:https://blog.torproject.org/blog/tor-browser-605-released