Lançado o Firefox 74

A Mozilla acaba de lançar o Firefox 74, confira as melhorias e correções.









Firefox 74


O Anúncio do lançamento foi feito em 10 de março de 2020.


"Versão 74.0, oferecida pela primeira vez para los usuários finais em 10 de março de 2020

Gostaríamos de agradecer especialmente a todos os novos moçambicanos que contribuíram para esta versão do Firefox."


Melhorias



  • Seu gerenciamento de login foi aprimorado com a capacidade de reverter a classificação alfa (Nome Z-A) no Lockwise, que você pode acessar em Logins e Senhas.

  • Agora, o Firefox simplifica a importação de seus favoritos e histórico do novo navegador Microsoft Edge no Windows e Mac.

  • Os complementos instalados por aplicativos externos agora podem ser removidos usando o Gerenciador de Complementos (sobre: addons). No futuro, apenas usuários poderão instalar complementos; eles não podem ser instalados por um aplicativo.

  • O Contêiner do Facebook impede que o Facebook o rastreie pela Web - logins, curtidas e comentários do Facebook são bloqueados automaticamente em sites que não são do Facebook. Mas quando precisamos de uma exceção, agora você pode criar uma adicionando sites personalizados ao contêiner do Facebook.

  • O Firefox agora oferece melhor privacidade para suas chamadas de voz e vídeo na Web por meio do suporte ao mDNS ICE, ocultando o endereço IP do seu computador com um ID aleatório em determinados cenários do WebRTC.


Correções de bugs




Security Vulnerabilities fixed in Firefox 74

Announced
March 10, 2020
Impact
high
Products
Firefox
Fixed in

Firefox 74

#CVE-2020-6805: Use-after-free when removing data about origins

Reporter
Brian Carpenter
Impact
high

Description

When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash.
References

Bug 1610880

#CVE-2020-6806: BodyStream::OnInputStreamReady was missing protections against state confusion

Reporter
Sergei Glazunov of Google Project Zero
Impact
high

Description

By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash.
References

Bug 1612308

#CVE-2020-6807: Use-after-free in cubeb during stream destruction

Reporter
C.M.Chang
Impact
high

Description

When a device was changed while a stream was about to be destroyed, the stream-reinit task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash.
References

Bug 1614971

#CVE-2020-6808: URL Spoofing via javascript: URL

Reporter
Abdulrahman Alqabandi
Impact
moderate

Description

When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document.
References

Bug 1247968

#CVE-2020-6809: Web Extensions with the all-urls permission could access local files

Reporter
Jan Biniok
Impact
moderate

Description

When a Web Extension had the all-urls permission and made a fetch request with a mode set to 'same-origin', it was possible for the Web Extension to read local files.
References

Bug 1420296

#CVE-2020-6810: Focusing a popup while in fullscreen could have obscured the fullscreen notification

Reporter
Avi Drissman of the Chrome security team
Impact
moderate

Description

After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the user about the current origin of the page and credential theft or other attacks.
References

Bug 1432856

#CVE-2020-6811: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection

Reporter
Ophir LOJKINE
Impact
moderate

Description

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.
References

Bug 1607742

#CVE-2019-20503: Out of bounds reads in sctp_load_addresses_from_init

Reporter
Natalie Silvanovich of Google Project Zero
Impact
moderate

Description

The inputs to sctp_load_addresses_from_init are verified by sctp_arethere_unrecognized_parameters; however, the two functions handled parameter bounds differently, resulting in out of bounds reads when parameters are partially outside a chunk.
References

Bug 1613765

#CVE-2020-6812: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission

Reporter
Jan-Ivar Bruaroey
Impact
moderate

Description

The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'.
References

Bug 1616661

#CVE-2020-6813: @import statements in CSS could bypass the Content Security Policy nonce feature

Reporter
Matheus Vrech
Impact
low

Description

When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy.
References

Bug 1605814

#CVE-2020-6814: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6

Reporter
Mozilla developers
Impact
high

Description

Mozilla developers Byron Campen, Jason Kratzer, and Christian Holler reported memory safety bugs present in Firefox 73 and Firefox ESR 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References

Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6

#CVE-2020-6815: Memory and script safety bugs fixed in Firefox 74

Reporter
Mozilla developers and community
Impact
high

Description

Mozilla developers Jason Kratzer, Boris Zbarsky, Tyson Smith, and Alexandru Michis reported memory safety and script safety bugs present in Firefox 73. Some of these bugs showed evidence of memory corruption or escalation of privilege and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References

Memory and script safety bugs fixed in Firefox 74




Fonte


Instalação


Você pode aguardar a nova versão chegar em seu repositório ou instalar agora mesmo seguindo a nossa matéria abaixo.

Instalar Firefox sempre atualizado na sua distribuição GNU/Linux






Comentários

Você precisa ver isso

Todos os arquivos do blog

Mostrar mais