Site icon On DarkNet – Dark Web News and Analysis

Tor Browser Releases Two Consecutive Minor Emergency Updates to Fix Multiple Major Security Vulnerabilities

Back in October of last year, a major version 13.0 of the Tor Browser was released, making several accessibility and user experience improvements. Recently, on March 19th and March 22nd, the Tor Project released two minor emergency updates to the Tor Browser, fixing several major security vulnerabilities in Firefox. "ODN" reminds everyone to upgrade the latest version of Tor Browser as soon as possible.

Tor Browser 13.0.12

On March 19th, the Tor Project released Tor Browser version 13.0.12, which removes the automatic prioritization of .onion sites on the one hand, and completes an important security update for Firefox on the other.

The Tor Project says it has recently received notifications of a potential fingerprinting vulnerability related to automatic Onion-Location redirection. As a precautionary measure, the "Prioritize .onion sites when known" option has been removed from the Tor Browser for the time being, and the Tor team is looking into the issue further and will provide an update as soon as more findings and recommendations are available.

According to the Tor website:

browser fingerprinting
Fingerprinting is the process of collecting information about a device or service to make educated guesses about its identity or characteristics. Unique behavior or responses can be used to identify the device or service analyzed. Tor Browser prevents fingerprinting.

According to the Mozilla Foundation's Security Bulletin, the following security vulnerabilities have been fixed in Tor Browser version 13.0.12 (based on Firefox ESR 115.9):

Tor Browser 13.0.13

On March 22, the Tor Project released Tor Browser version 13.0.13, an unplanned emergency update release that contains important security updates for the desktop platform Firefox. The Android version of the Tor Browser is not affected.

According to the Mozilla Foundation's security bulletin, the security vulnerabilities fixed in Tor Browser version 13.0.13 (based on Firefox ESR 115.9.1) are listed below:

CVE-2024-29944: Privileged JavaScript Execution via Event Handlers (An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. Note: This vulnerability affects Desktop Firefox only, it does not affect mobile versions of Firefox.)

If you have installed Tor Browser, please update it as soon as possible via the "Check for Updates" button on the Tor Browser itself.

Exit mobile version