Warned:Critical Tor flaw leaks users’ real IP address—update now

 Tor Browser security bugfix release for macOS and Linux users only.

Linux reports of that Tor-browser anonymity browser simply accepted a temporary fix for a critical vulnerability that oozes users’ IP addresses if others encourage several types of addresses.
Tor-Moil, as the flaw has been dubbed by its discoverer, is triggered when users click on links that begin with file:// rather than the more common https:// and HTTP:// address prefixes. While this Tor-browser to mac-OS and Linux does in each method of preparing such an approach, “the operating system may directly connect to the remote host, bypass Tor Browser,” according to a brief blog post published Tuesday by We Are Segment, the security firm that privately reported the bug to Tor developers.
At Friday(03/04/2017), features of the Tor Project distributed a brief workaround that plugs that IP leak. Till that concluding fix is in place, updated versions of the browser may not behave properly when navigating to file:// addresses. 
They announced both those Windows versions of Tor, Tails, and the sandboxed Tor browser that’s in the alpha trial aren’t exposed.
“The fix we deployed is just a workaround stopping the leak,” Tor officials wrote in a post announcing Friday’s release. “As a result of that navigating file:// URLs in the browser might not work as expected anymore. In particular entering file:// URLs in the URL bar and clicking on resulting links is broken. Opening those in a new tab or new window does not work either. Each workaround during these problems is moving the ring into the URL bar or on a tab instead. We follow this follow-up regression in bug 24136.”
Friday’s post went on to say that We Are Segment CEO Filippo Cavallarin privately reported the vulnerability on October 26. Tor developers managed among Mozilla developers to build a workaround that later day, but it only partially worked. They finished work on a more complete workaround on Tuesday. The post didn’t explain why the fix, delivered in Tor browser version 7.0.9 for Mac and Linux users, wasn’t issued until Friday, three days later. This Tor browser is based moving Mozilla’s open-source Firefox browser. This IP flow begins of a Firefox bug.
Tor officials also warned that alpha versions of the Tor browser for Mac and Linux haven’t yet received the fix. Both announced they have temporarily registered a spot to go live on Monday for those versions. In the meantime, the officials said, Mac and Linux alpha users should use updated versions of the stable version.
Tor’s declaration Friday announced there’s no proof the flaw has been actively employed on the Internet or dark web to obtain the IP addresses or Tor users. Of course, the lack of evidence doesn’t mean the flaw wasn’t exploited by law enforcement officers, private investigators, or stalkers. And now that a fix is available, it will be easy for adversaries who didn’t know about the vulnerability before to create working exploits. Anyone who relies on a Mac or Linux version of the Tor browser to shield their IP address should update as soon as practicable and do willing for the chance, still unknown, their IP addresses should previously be leaked