Security News > 2020 > June > Firefox fixes cryptographic data leakage in latest security update
We couldn't believe it either - it's four weeks since Firefox's last regular security update.
If you want to check your version numbers, Firefox 76.0 is now replaced by 77.0; Firefox 68.8.0ESR is now 68.9.0ESR, and the Tor Browser, based on Firefox ESR, is now at version 9.5 and based on 68.9.0ESR. As we've explained before but we'll mention again because it's useful to know, the first two numbers in the ESR version should add up to the leftmost number in the regular release.
So the current ESR is based on the feature set of Firefox 68, but with 9 updates' worth of regular security fixes in there, so it is at 68+9=77 in security terms.
The extent to which new features bring new bugs of their own can be inferred from the fact that the Security Advisory for this update has two separate items for "Memory mananagment bugs fixed in 77 and in 68.9ESR" and for "Memory management bugs fixed in 77 only".
Firefox uses NSS instead of OpenSSL or any of its other widely-known open source variants such as OpenBSD's LibreSSL or Google's BoringSSL. DSA is short for Digital Signature Algorithm, a cryptographic process used as part of the security in many TLS connections.