|
[[!meta date="Wed, 11 Nov 2020 21:15:09 +0000"]]
|
|
|
[[!meta title="JavaScript vulnerability in Tor Browser"]]
|
|
|
[[!pagetemplate template="news.tmpl"]]
|
[[!pagetemplate template="news.tmpl"]]
|
|
[[!tag security/fixed]]
|
[[!tag security/fixed]]
|
|
A [critical vulnerability](https://www.mozilla.org/en-US/security/advisories/mfsa2020-49/) was discovered in the JavaScript engine of *Firefox* and *Tor Browser*.
|
|
|
Until Tails 4.13 (November 17), we recommend all users to set the [[security level of *Tor Browser*|doc/anonymous_internet/Tor_Browser#security-level]] to *Safer* or *Safest*.
|
|
|
This vulnerability was discovered during the [Tianfu Cup 2020 International Cybersecurity Contest](http://www.tianfucup.com/). The details of the vulnerability were not disclosed.
|
|
|
We are not aware of any use of this vulnerability against actual users.
|
|
|
The *Safer* or *Safest* security level of *Tor Browser* are not affected because the feature of JavaScript that is affected, the *[[!wikipedia just-in-time compilation]]*, is disabled at these security levels.
|
|
|
Mozilla fixed this vulnerability in *Firefox* 78.4.1 and Tor fixed this vulnerability in *Tor Browser* 10.0.4.
|
|
|
We decided not to release an emergency upgrade of Tails because:
|
|
|
Tails 4.13 is already scheduled for November 17 and will fix this vulnerability.
|
|
|
Our main release manager left the team recently and we have very limited staffpower right now.
|
|
|
The details of the vulnerability were not disclosed, making it harder to exploit, and we are not aware of any use of this vulnerability against actual users.
|
|