Firefox 18.0 Final Now Available for Download

Firefox 18.0 Final is now available for download from Mozilla download center. Firefox 18.0 includes JavaScript improvements that make Web apps and games perform better and support for W3C Touch Events. This Update also supports Retina Display for Mac users.

New features in Firefox 18.0
  • IonMonkey: IonMonkey is a new JavaScript JIT compiler that provides a more efficient way for Firefox to process JavaScript. With IonMonkey, Firefox will perform faster with Web apps, games and other JavaScript-heavy pages.
  • Retina Display Support: Firefox 18.0 supports Retina Display for Mac users to make Firefox even sharper when watching movies, playing games and browsing the Web.
  • Disable Insecure Content: Firefox 18.0 can disable insecure content on HTTPS secure websites to maintain the privacy of your communication with the website. You can enable the feature in about:config.
  • Support for W3C Touch Events: Firefox 18.0 supports standard W3C touch events in addition to MozTouch events.

Download Firefox 18.0 Final:
Firefox 18.0 Final available for download from Mozilla download center as links listed below:

Firefox 18.0 (Running on Windows 8 Enterprise)

What's new in Firefox 18.0?
Firefox 18.0 has the following changes:

New:
  • IonMonkey: IonMonkey is a new JavaScript JIT compiler that provides a more efficient way for Firefox to process JavaScript.
  • Support for Retina Display on Mac OS X 10.7 and up.
  • Preliminary support for WebRTC.

Changed:
  • Experience better image quality with our new HTML scaling algorithm.
  • Performance improvements around tab switching.

Developer:
  • Support for new DOM property window.devicePixelRatio.
  • Improvement in startup time through smart handling of signed extension certificates.

HTML5:
  • Support for W3C touch events impemented, taking the place of MozTouch events.

Fixed:
  • Disable insecure content loading on HTTPS pages.
  • Improved responsiveness for users on proxies.

Security fixed:
  • MFSA 2013-20 Mis-issued TURKTRUST certificates. [Critical]
  • MFSA 2013-19 Use-after-free in Javascript Proxy objects. [Critical]
  • MFSA 2013-18 Use-after-free in Vibrate. [Critical]
  • MFSA 2013-17 Use-after-free in ListenerManager. [Critical]
  • MFSA 2013-16 Use-after-free in serializeToStream. [Critical]
  • MFSA 2013-15 Privilege escalation through plugin objects. [Critical]
  • MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype. [High]
  • MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG. [High]
  • MFSA 2013-12 Buffer overflow in Javascript string concatenation. [Critical]
  • MFSA 2013-11 Address space layout leaked in XBL objects. [High]
  • MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy. [High]
  • MFSA 2013-09 Compartment mismatch with quickstubs returned values. [High]
  • MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection. [Critical]
  • MFSA 2013-07 Crash due to handling of SSL on threads. [High]
  • MFSA 2013-06 Touch events are shared across iframes. [Moderate]
  • MFSA 2013-05 Use-after-free when displaying table with many columns and column groups. [Critical]
  • MFSA 2013-04 URL spoofing in addressbar during page loads. [High]
  • MFSA 2013-03 Buffer Overflow in Canvas. [Critical]
  • MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer. [Critical]
  • MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2) [Critical]
  • MFSA 2012-98 Firefox installer DLL hijacking. [High]

References:

No comments: