• Tor Browser 15.0.6 (2026-2-16)

    From noreply@noreply@mixmin.net to alt.privacy.anon-server on Thu Feb 19 17:09:59 2026
    From Newsgroup: alt.privacy.anon-server


    https://blog.torproject.org/new-release-tor-browser-1506/
    New Release: Tor Browser 15.0.6
    by ma1 | February 16, 2026
    Tor Browser 15.0.6 is now available from the Tor Browser download page >https://www.torproject.org/download/
    and also from our distribution directory. >https://www.torproject.org/dist/torbrowser/15.0.6/
    This version includes important security updates to Firefox.
    ^^^^ ^^^^^^^ ^^^^^^^^ ^^^^^^^^^ ^^^^^^^^ ^^^^^^^ ^^ ^^^^^^^ >https://www.mozilla.org/en-US/security/advisories/
    Send us your feedback
    If you find a bug or have a suggestion for how we could improve this release, >please let us know.
    Full changelog
    The full changelog since Tor Browser 15.0.5 is:
    All Platforms
    Updated NoScript to 13.5.13.1984
    Updated Tor to 0.4.9.5
    Bug tor-browser#44625: metamask.io won't load on Safer security level
    Bug tor-browser#44626: Propagate WASM blocking to workers
    Bug tor-browser#44640: Rebase Tor Browser stable onto 140.7.1esr
    Windows + macOS + Linux
    Updated Firefox to 140.7.1esr
    Android
    Updated GeckoView to 140.7.1esr
    Build System
    All Platforms
    Bug tor-browser-build#40338: Running make release multiple times fails
    Bug tor-browser-build#41708: relprep.py fails to update extensions when
    out/browser does not exist
    Bug tor-browser-build#41720: cp -l in release/build fails when crossing
    file systems
    Windows + Linux + Android
    Updated Go to 1.24.13
    [end quoted excerpt]

    (using Tor Browser 15.0.6)
    https://www.mozilla.org/en-US/security/advisories/
    Mozilla Foundation Security Advisories
    Impact key
    Critical Vulnerability can be used to run attacker code and install software,
    requiring no user interaction beyond normal browsing.
    High Vulnerability can be used to gather sensitive data from sites in other
    windows or inject data or code into those sites, requiring no more than normal
    browsing actions.
    Moderate Vulnerabilities that would otherwise be High or Critical except they
    only work in uncommon non-default configurations or require the user to perform
    complicated and/or unlikely steps.
    Low Minor security vulnerabilities such as Denial of Service attacks, minor
    data leaks, or spoofs. (Undetectable spoofs of SSL indicia would have "High"
    impact because those are generally used to steal sensitive data intended for
    other sites.)
    February 16, 2026
    MFSA 2026-11 Security Vulnerabilities fixed in Thunderbird 147.0.2 and 140.7.2
    MFSA 2026-10 Security Vulnerabilities fixed in 147.0.4, ESR 140.7.1, and ESR
    115.32.1
    [end quoted excerpt]

    --- Synchronet 3.21b-Linux NewsLink 1.2