Tor Browser 6.5a5 is released
This release features an important security update to Firefox and contains, in addition to that, an update to NoScript (220.127.116.11) and a fix of our updater code so it can handle unix domain sockets.
The Firefox security flaw responsible for this urgent release is already actively exploited on Windows systems. Even though there is currently, to the best of our knowledge, no similar exploit for OS X or Linux users available the underlying bug affects those platforms as well. Thus we strongly recommend that all users apply the update to their Tor Browser immediately. A restart is required for it to take effect.
Tor Browser users who had set their security slider to "High" are believed to have been safe from this vulnerability.
A note to Linux users: We still require the same update procedure as experienced during the update to 6.5a4: a dialog will be shown asking to either set `app.update.staging.enabled` or `extensions.torlauncher.control_port_use_ipc` and `extensions.torlauncher.socks_port_use_ipc` to `false` (and restart the browser in the latter case) before attempting to update. The fix for this problem is shipped with this release and we will be back to a normal update experience with the update to 6.5a6. We are sorry for this inconvenience.
Here is the full changelog since 6.5a4:
- All Platforms
- Update Firefox to 45.5.1esr
- Update NoScript to 18.104.22.168
- Bug 20691: Updater breaks if unix domain sockets are used