Pale Moon has been updated to version 29.4.2. This is a security update. Linux versions will follow shortly.
Changes/fixes:
- Fixed a spec compliance issue with IDN that could potentially cause confusion of domain names.
- Fixed several intermittent thread sanity issues. DiD
- Fixed a potential UAF risk in certain situations in networking. DiD
- Fixed a potential crash risk (not exposed). DiD
- Fixed a potential spoofing risk using form validation. (CVE-2021-38508)
- Fixed a script sandbox escape issue through XSLT. (CVE-2021-38503)
- Unified XUL Platform Mozilla Security Patch Summary: 3 fixed, 1 already applied, 4 DiD, 7 not applicable.
Security notice: If you have enabled HTTP Alternative Services for Opportunistic Encryption, it is strongly recommended you disable this at this time through Preferences -> Security -> Opportunistic Encryption -> Enable HTTP Alternative Services for Opportunistic Encryption. This inherently weak transitional technology for http -> https has been compromised and can be abused (partial opt-in bypass). Note that our platform default for this setting (and any other OE) is disabled due to these kinds of inherent risks, as well as lack of transparency about the connection and server contacted. See CVE-2021-38507 for more details about this problem.
*DiD This means that a fix is "Defense-in-Depth": It is a fix that does not apply to a (potentially) actively exploitable vulnerability in Pale Moon, but prevents future vulnerabilities caused by the same code, e.g. when surrounding code changes, exposing the problem, or when new attack vectors are discovered.
Pale Moon includes both 32- and 64-bit versions for Windows: Pale Moon for Windows downloads.
Update
To get the update now, select "Help" from the Pale Moon menu at the upper left of the browser window. Select About Pale Moon > Check for Updates.
No comments:
Post a Comment