Mozilla last week released Firefox 26, which kicked off a limited form of click-to-play function and patched 15 security vulnerabilities, six of which were marked “critical.”
Click-to-play—a security feature that requires users to authorize the use of a plug-in when a website or page element requires it—has been adopted by other browsers as protection against a rising tide of exploits that leverage bugs in plug-ins, particularly Adobe’s Flash Player and Oracle’s Java.
Google’s Chrome, for example, has long offered click-to-play, although it has been turned off by default.
In January 2013, Mozilla announced it would require click-to-play for all installed plug-ins except for Flash, then later added the feature to developer and beta builds of Firefox 26.
But when the updated browser made its debut, only the Java plug-in was stuck behind the click-to-play wall; all other plug-ins automatically ran. Mozilla did not immediately reply to questions, but threads on the company’s discussion groups hinted that the feature slipped because developers wanted to do more testing of other plug-ins before expanding click-to-play.
Memory management tackled
Firefox 26 also saw the wrap-up of “MemShrink,” a two-year project to reduce the browser’s memory footprint that focused on plugging “leaks” created when code doesn’t properly release memory after a chore is completed. The leaked memory is never returned to the available pool, reducing what’s available for other applications, or even for Firefox. Eventually, performance suffers.
Complaints about Firefox’s memory usage have historically centered on the browser’s habit of not releasing memory when tabs are closed.
In a post to his personal blog, Nicolas Nethercote, the developer who led MemShrink, said the project had been completed. Previously, Nethercote had touted a pair of final bug fixes that landed in Firefox 26 which curtailed memory usage spikes and improved load times of image-heavy pages.
Along with the debut of click-to-play and the wrap-up of MemShrink, Mozilla also tucked patches for 15 vulnerabilities into Firefox 26. A half-dozen of the fixes were tagged critical, Mozilla’s most serious threat ranking.
Among the critical vulnerabilities were several “use-after-free” bugs, a type of memory management flaw. One of those was reported by Nils, a German researcher who goes only by his first name. Nils is a noted vulnerability researcher, half of a two-man team who won $100,000 in March for hacking Google’s Chrome at the Pwn2Own contest.
Several other vulnerabilities were reported by researchers working for BlackBerry, the troubled Canadian smartphone maker. Last summer, Mozilla and BlackBerry began collaborating on security, with an emphasis on “fuzzing,” a process that stress-tests code to locate bugs.
Windows, Mac, and Linux editions of Firefox 26 can be downloaded from Mozilla’s site; already installed copies will upgrade automatically. Users of Firefox for Android can retrieve the update from the Google Play store. The latter sports a new home screen and support for Bing and Yahoo as search choices in the U.S. and some countries of the European Union.
The next version of Firefox is scheduled to ship February 4. The version after that—Firefox 28 is slated to show up March 14—will be the first to sport the new user interface (UI), dubbed “Australis,” that Mozilla has been working on since May 2012.
This story, "Mozilla updates Firefox, adds click-to-play and patches" was originally published by Computerworld.