Firefox 40 released
FYI...
Firefox 40 released
From an admin. account, start Firefox, then >Help >About >Check for Updates ...
-or-
Download:
https://www.mozilla.org/en-US/firefox/all/
Release notes
-
https://www.mozilla.org/en-US/firefox/40.0/releasenotes/
What’s New:
- Support for Windows 10
- Added protection against unwanted software downloads
(More at the URL above.)
Fixed in Firefox 40.0
-
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/#firefox40
2015-92 Use-after-free in XMLHttpRequest with shared workers
2015-91 Mozilla Content Security Policy allows for asterisk wildcards in violation of CSP specification
2015-90 Vulnerabilities found through code inspection
2015-89 Buffer overflows on Libvpx when decoding WebM video
2015-88 Heap overflow in gdk-pixbuf when scaling bitmap images
2015-87 Crash when using shared memory in JavaScript
2015-85 Out-of-bounds write with Updater and malicious MAR file
2015-83 Overflow issues in libstagefright
2015-82 Redefinition of non-configurable JavaScript object properties
2015-81 Use-after-free in MediaStream playback
2015-80 Out-of-bounds read with malformed MP3 file
2015-79 Miscellaneous memory safety hazards (rv:40.0/rv:38.2)
...
complete list of changes in this release - 3453 bugs found.
Fixed in Firefox ESR 38.2
-
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr38.2
___
Expanded Malware Protection in Firefox
-
https://blog.mozilla.org/security/2015/08/11/expanded-malware-protection-in-firefox/
Aug 11, 2015
___
-
http://www.securitytracker.com/id/1033247
CVE Reference: CVE-2015-4473, CVE-2015-4474, CVE-2015-4475, CVE-2015-4477, CVE-2015-4478, CVE-2015-4479, CVE-2015-4480, CVE-2015-4481, CVE-2015-4482, CVE-2015-4483, CVE-2015-4484, CVE-2015-4485, CVE-2015-4486, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4490, CVE-2015-4491, CVE-2015-4492, CVE-2015-4493
Aug 11 2015
Impact: Denial of service via network, Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): prior to 40.0...
Solution: The vendor has issued a fix (40.0, ESR 38.2)...
:fear::fear: