Development Build
Below are development builds for testing purposes.
Latest development build: 2.7.0.10 (April 14th 2026)
Latest stable release build: 2.7.0
https://github.com/clsid2/mpc-hc/releases/tag/2.7.0
Below are development builds for testing purposes.
Latest development build: 2.7.0.10 (April 14th 2026)
Latest stable release build: 2.7.0
https://github.com/clsid2/mpc-hc/releases/tag/2.7.0
Bugfix release.
lazbuild - (c9c6be0).exe extension!!! - (35d2ebd).deb - (e95aca8)Package variable - (13c55ce)v4 of git-cliff-action - (81d613b)build-* - (16a54a5)tx-push recipe - (d293d64).ini files on run-* - (c513e53)run-gtk2, run-qt5 - (04650d9)tx-push to Makefile - (3ceed39)secrets.mk - (123a2e7)Note
For a list of all the changes up to date, please read CHANGELOG.md.
Bump version for v12.17 release
The Extended Stable channel has been updated to 146.0.7680.188 for Windows and Mac which will roll out over the coming days/weeks.
The Chrome team is delighted to announce the promotion of Chrome 147 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks.
Security Fixes and Rewards
Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.
This update includes multiple security fixes. Please see the Chrome Security Page for more information.
[$43000][493319454] Critical CVE-2026-5858: Heap buffer overflow in WebML. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-17
[$43000][494158331] Critical CVE-2026-5859: Integer overflow in WebML. Reported by Anonymous on 2026-03-19
[$11000][486495143] High CVE-2026-5860: Use after free in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-22
[$3000][486927780] High CVE-2026-5861: Use after free in V8. Reported by 5shain on 2026-02-23
[TBD][470566252] High CVE-2026-5862: Inappropriate implementation in V8. Reported by Google on 2025-12-21
[TBD][484527367] High CVE-2026-5863: Inappropriate implementation in V8. Reported by Google on 2026-02-14
[TBD][490642831] High CVE-2026-5864: Heap buffer overflow in WebAudio. Reported by Syn4pse on 2026-03-08
[TBD][491884710] High CVE-2026-5865: Type Confusion in V8. Reported by Project WhatForLunch (@pjwhatforlunch) on 2026-03-12
[TBD][492218537] High CVE-2026-5866: Use after free in Media. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-13
[TBD][492668885] High CVE-2026-5867: Heap buffer overflow in WebML. Reported by Syn4pse on 2026-03-14
[TBD][493256564] High CVE-2026-5868: Heap buffer overflow in ANGLE. Reported by cinzinga on 2026-03-16
[TBD][493708165] High CVE-2026-5869: Heap buffer overflow in WebML. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-18
[TBD][495534710] High CVE-2026-5870: Integer overflow in Skia. Reported by Google on 2026-03-23
[TBD][495679730] High CVE-2026-5871: Type Confusion in V8. Reported by Google on 2026-03-24
[TBD][496281816] High CVE-2026-5872: Use after free in Blink. Reported by Google on 2026-03-25
[TBD][496301615] High CVE-2026-5873: Out of bounds read and write in V8. Reported by Google on 2026-03-25
[$11000][485397279] Medium CVE-2026-5874: Use after free in PrivateAI. Reported by Krace on 2026-02-18
[$4000][430198264] Medium CVE-2026-5875: Policy bypass in Blink. Reported by Lyra Rebane (rebane2001) on 2025-07-08
[$2000][41485206] Medium CVE-2026-5876: Side-channel information leakage in Navigation. Reported by Lyra Rebane (rebane2001) on 2023-12-18
[TBD][333024273] Medium CVE-2026-5877: Use after free in Navigation. Reported by Cassidy Kim(@cassidy6564) on 2024-04-05
[TBD][365089001] Medium CVE-2026-5878: Incorrect security UI in Blink. Reported by Shaheen Fazim on 2024-09-06
[TBD][40073848] Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE. Reported by parkminchan, working for SSD Labs Korea on 2023-10-01
[TBD][424995036] Medium CVE-2026-5880: Incorrect security UI in browser UI. Reported by Anonymous on 2025-06-14
[TBD][454162508] Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess. Reported by asnine on 2025-10-22
[TBD][480993682] Medium CVE-2026-5882: Incorrect security UI in Fullscreen. Reported by Anonymous on 2026-02-02
[TBD][482958590] Medium CVE-2026-5883: Use after free in Media. Reported by sherkito on 2026-02-09
[TBD][484547633] Medium CVE-2026-5884: Insufficient validation of untrusted input in Media. Reported by xmzyshypnc on 2026-02-15
[TBD][485203823] Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML. Reported by Bryan Bernhart on 2026-02-17
[TBD][485397283] Medium CVE-2026-5886: Out of bounds read in WebAudio. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-18
[TBD][486079015] Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads. Reported by daffainfo on 2026-02-20
[TBD][486506202] Medium CVE-2026-5888: Uninitialized Use in WebCodecs. Reported by Identified by the Octane Security Team: Giovanni Vignone, Paolo Gentry, Robert van Eijk on 2026-02-22
[TBD][486906037] Medium CVE-2026-5889: Cryptographic Flaw in PDFium. Reported by mlafon on 2026-02-23
[TBD][487259772] Medium CVE-2026-5890: Race in WebCodecs. Reported by Casper Woudenberg on 2026-02-24
[TBD][487471101] Medium CVE-2026-5891: Insufficient policy enforcement in browser UI. Reported by Tianyi Hu on 2026-02-25
[TBD][487568011] Medium CVE-2026-5892: Insufficient policy enforcement in PWAs. Reported by Tianyi Hu on 2026-02-25
[TBD][487768771] Medium CVE-2026-5893: Race in V8. Reported by QYmag1c on 2026-02-26
[$1000][481882038] Low CVE-2026-5894: Inappropriate implementation in PDF. Reported by Povcfe of Tencent Security Xuanwu Lab on 2026-02-05
[TBD][374285495] Low CVE-2026-5895: Incorrect security UI in Omnibox. Reported by Renwa Hiwa @RenwaX23 on 2024-10-18
[TBD][40064543] Low CVE-2026-5896: Policy bypass in Audio. Reported by Luan Herrera (@lbherrera_) on 2023-05-13
[TBD][419921726] Low CVE-2026-5897: Incorrect security UI in Downloads. Reported by Farras Givari on 2025-05-24
[TBD][470295118] Low CVE-2026-5898: Incorrect security UI in Omnibox. Reported by saidinahikam032 on 2025-12-19
[TBD][474817168] Low CVE-2026-5899: Incorrect security UI in History Navigation. Reported by Islam Rzayev on 2026-01-11
[TBD][475265304] Low CVE-2026-5900: Policy bypass in Downloads. Reported by Luan Herrera (@lbherrera_) on 2026-01-13
[TBD][479673903] Low CVE-2026-5901: Policy bypass in DevTools. Reported by Povcfe of Tencent Security Xuanwu Lab on 2026-01-29
[TBD][483109205] Low CVE-2026-5902: Race in Media. Reported by Luke Francis on 2026-02-10
[TBD][483771899] Low CVE-2026-5903: Policy bypass in IFrameSandbox. Reported by @Ciarands on 2026-02-11
[TBD][483851888] Low CVE-2026-5904: Use after free in V8. Reported by Zhenpeng (Leo) Lin at depthfirst on 2026-02-12
[TBD][483899628] Low CVE-2026-5905: Incorrect security UI in Permissions. Reported by daffainfo on 2026-02-12
[TBD][484082189] Low CVE-2026-5906: Incorrect security UI in Omnibox. Reported by mohamedhesham9173 on 2026-02-13
[TBD][484665123] Low CVE-2026-5907: Insufficient data validation in Media. Reported by Luke Francis on 2026-02-15
[TBD][485115554] Low CVE-2026-5908: Integer overflow in Media. Reported by Ameen Basha M K & Mohammed Yasar B on 2026-02-17
[TBD][485203821] Low CVE-2026-5909: Integer overflow in Media. Reported by Mohammed Yasar B & Ameen Basha M K on 2026-02-17
[TBD][485212874] Low CVE-2026-5910: Integer overflow in Media. Reported by Ameen Basha M K & Mohammed Yasar B on 2026-02-17
[TBD][485785246] Low CVE-2026-5911: Policy bypass in ServiceWorkers. Reported by lebr0nli of National Yang Ming Chiao Tung University, Dept. of CS, Security and Systems Lab on 2026-02-19
[TBD][486498791] Low CVE-2026-5912: Integer overflow in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-22
[TBD][487195286] Low CVE-2026-5913: Out of bounds read in Blink. Reported by Vitaly Simonovich on 2026-02-24
[TBD][490023239] Low CVE-2026-5914: Type Confusion in CSS. Reported by Syn4pse on 2026-03-05
[TBD][494341335] Low CVE-2026-5915: Insufficient validation of untrusted input in WebML. Reported by ningxin.hu@intel.com on 2026-03-20
[TBD][490139441] Low CVE-2026-5918: Inappropriate implementation in Navigation. Reported by Google on 2026-03-05
[TBD][483423893] Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets. Reported by Richard Belisle on 2026-02-10
We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.
Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.
Interested in switching release channels? Find out how here. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.
Srinivas Sista
Google Chrome
Various security fixes.
Fixed an issue where certain parts of web pages, such as drop-down menus and specific styles, did not appear correctly when printing. (Bug 2026109)
Fixed an issue where some website error pages displayed generic connection messages instead of the specific error code and description provided by the server. (Bug 2023800)
Fixed a crash that occurred when using certain security keys or WebAuthn features for two-factor authentication. (Bug 2026688)
Fixed an issue on Linux where the browser toolbar could become unresponsive to mouse clicks after dragging a tab when using Wayland. (Bug 2022238)
Fixed a layout issue where text inside certain graphics (SVG) appeared shifted or misaligned from its intended position. (Bug 2024647)
Fixed an issue where the "Send to device" option failed to work when used from the Open Tabs section in Firefox View. (Bug 2023201)
Introduced a new enterprise policy that allows administrators to directly manage and control AI-related features within Firefox. (Bug 2019983)
Fixed an issue where enterprise policies for the browser homepage and start page were not being applied correctly. (Bug 2027888)
Introduced a new enterprise policy that allows administrators to prevent the built-in VPN and IP protection features from being available to users. (Bug 2022365)
Reference link to 149.0 release notes.

P.S.: If you enjoy Dopamine, please consider donating via PayPal or buying me a coffee. Your support keeps the music going!
6th Anniversary Ver.
SHA-256
ddcbcbf3341225d0c5df43f1d7cc65de0b8b2131643184c1a3ea359107789faa ventoy-1.1.11-linux.tar.gz
7509a24851f4b198268d868e085c2a016891adc758d2e0d2a554df35d5a23f32 ventoy-1.1.11-livecd.iso
1e56e02fc424c194fc4f33357cb949867854f386d67eaf9764f1c96264561493 ventoy-1.1.11-windows.zip
===============================================================================
Wana boot and install OS through network (PXE)? Welcome to my new project iVentoy.
About iVentoy https://www.iventoy.com/
iVentoy is an enhanced version of the PXE server.
Extremely easy to use
Many advanced features
x86 Legacy BIOS, IA32 UEFI, x86_64 UEFI and ARM64 UEFI mode supported
110+ common types of OS supported (Windows/WinPE/Linux/VMware)
......
Donations are appreciated. There is now a PayPal option.
Updates:
Changes:
Fixes:
Subtitle downloads from OpenSubtitles may fail depending on time of day. This is due to our daily download quota being exceeded. Current amount of donations is barely enough to pay for the existing quota. So it is unlikely that quota can be increased and situation will get worse over time.
If you create an OpenSubtitles account and configure it in MPC-HC settings then you may be able to bypass the quota.
Options > Subtitles > Misc > Right-click on OpenSubtitles.com > Setup > Fill in username/password
A lot of people seem to be unaware of some of the awesome features that have been added to MPC-HC in the past years. Here is a list of useful options and features that everyone should know about:
OBS-Studio-32.1.1-Sources.tar.gz: f4c17e1aa2a00efd8729ed6cfef9308bc6a2b6c583c187d7959eaa72eb2e3676
OBS-Studio-32.1.1-Ubuntu-24.04-x86_64-dbsym.ddeb: 243b047753fd8c1753e379913e80ff5e8bb9ab5d804778666891653ba20c1a14
OBS-Studio-32.1.1-Ubuntu-24.04-x86_64.deb: c69b5846e2eef622e902beb3606d614592735b4aac3b2a3c07bb7a1a5f52b9c4
OBS-Studio-32.1.1-Windows-arm64-PDBs.zip: 2f44c1f96bb671c8cc6dbbc51a9d8c9736a1d32d1ac1969cf69a53acf1f4fe86
OBS-Studio-32.1.1-Windows-arm64.zip: f54a9224adb1fdd496476475235527965327e93f912b64af9debdd833335aee3
OBS-Studio-32.1.1-Windows-x64-Installer.exe: 9b4b643a44154ed8bee5229a4e0c85f6826f76b7e38b1d0d1d7e8b349dfa38e1
OBS-Studio-32.1.1-Windows-x64-PDBs.zip: ad88f71888c4bd089fa1f63209b19ca082765247a00a8e19aa16a5eecc74f7d8
OBS-Studio-32.1.1-Windows-x64.zip: a4cc40a06d5a5dc158c792631b596a04b02d8fe99644a0f0bc3b12199dbce011
OBS-Studio-32.1.1-macOS-Apple-dSYMs.tar.xz: b597e805d476713118d4c9146f34876aa15482caec90d4ce851ba408ef8a59bd
OBS-Studio-32.1.1-macOS-Apple.dmg: e62c2fbea6872b015d0e9cf11f8be1ce4c545a5ce39da32420f754f2b0461dcb
OBS-Studio-32.1.1-macOS-Intel-dSYMs.tar.xz: 1a2b2e83d84ab50fe864d636f343acb38876809b397de0d3ba8a46c72dfd1854
OBS-Studio-32.1.1-macOS-Intel.dmg: 0a444c9b9b63f6871a592f0517a3c5114a08a5d555155f84e447a686e936750a
The Stable channel has been updated to 147.0.7727.49/.50 for Windows and Mac as part of our early stable release to a small percentage of users. A full list of changes in this build is available in the log.
You can find more details about early Stable releases here.
Interested in switching release channels? Find out how here. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.
Krishna Govind
Google Chrome
The Stable channel has been updated to 146.0.7680.177/178 for Windows/Mac and 146.0.7680.177 for Linux, which will roll out over the coming days/weeks. A full list of changes in this build is available in the Log
Security Fixes and Rewards
Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.
This update includes 21 security fixes. Please see the Chrome Security Page for more information.
[TBD][493952652] High CVE-2026-5273: Use after free in CSS. Reported by Anonymous on 2026-03-18
[TBD][491732188] High CVE-2026-5272: Heap buffer overflow in GPU. Reported by inspector-ambitious on 2026-03-11
[TBD][488596746] High CVE-2026-5274: Integer overflow in Codecs. Reported by heapracer (@heapracer) on 2026-03-01
[TBD][489494022] High CVE-2026-5275: Heap buffer overflow in ANGLE. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-04
[TBD][489711638] High CVE-2026-5276: Insufficient policy enforcement in WebUSB. Reported by Ariel Simon on 2026-03-04
[TBD][489791424] High CVE-2026-5277: Integer overflow in ANGLE. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-05
[TBD][490254128] High CVE-2026-5278: Use after free in Web MIDI. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-06
[TBD][490642836] High CVE-2026-5279: Object corruption in V8. Reported by Hyeonjun Ahn (@_deayzl) on 2026-03-08
[TBD][491515787] High CVE-2026-5280: Use after free in WebCodecs. Reported by heapracer (@heapracer) on 2026-03-11
[TBD][491518608] High CVE-2026-5281: Use after free in Dawn. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-10
[TBD][491655161] High CVE-2026-5282: Out of bounds read in WebCodecs. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-11
[TBD][492131521] High CVE-2026-5283: Inappropriate implementation in ANGLE. Reported by sweetchip on 2026-03-12
[TBD][492139412] High CVE-2026-5284: Use after free in Dawn. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-12
[TBD][492228019] High CVE-2026-5285: Use after free in WebGL. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-13
[TBD][493900619] High CVE-2026-5286: Use after free in Dawn. Reported by sweetchip on 2026-03-18
[TBD][494644471] High CVE-2026-5287: Use after free in PDF. Reported by Syn4pse on 2026-03-21
[NA][495507390] High CVE-2026-5288: Use after free in WebView. Reported by Google on 2026-03-23
[NA][495931147] High CVE-2026-5289: Use after free in Navigation. Reported by Google on 2026-03-25
[NA][496205576] High CVE-2026-5290: Use after free in Compositing. Reported by Google on 2026-03-25
[TBD][490118036] Medium CVE-2026-5291: Inappropriate implementation in WebGL. Reported by heapracer (@heapracer) on 2026-03-06
[NA][492213293] Medium CVE-2026-5292: Out of bounds read in WebCodecs. Reported by Google on 2026-03-12
Google is aware that an exploit for CVE-2026-5281 exists in the wild.
We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.
Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.
Interested in switching release channels? Find out how here. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.
Srinivas Sista
P.S.: If you enjoy Dopamine, please consider donating via PayPal or buying me a coffee. Your support keeps the music going!
Fix issue security advisory on DTD processing. Make default Ignore DTD option True, which is more secure.
Fix issue security advisory on DTD processing. Make default Ignore DTD option True, which is more secure.
Fix issue security advisory on DTD processing.
Windows Installer
Windows No Installer (zip)
macOS - Universal
Linux - deb, AppImage or rpm
Windows intel x32 releases are marked -ia32-
ChangeLog:
By Leo Wattenberg
Wednesday, June 11, 2025With Audacity 3.7.4, we finally are adding macOS support to the Intel OpenVINO AI plugins. Once you’ve downloaded Audacity 3.7.4 and downloaded the OpenVINO plugins (and installed both), you should find them in Effects → OpenVINO AI Effects.
As a reminder, these effects are completely free and run on your own machine, no internet connection required.
The following effects are available:
As this is the first release of these plugins for macOS, we’re considering them to be a beta of sorts: While we’ve tested them on our machines, there’s only so many devices flying about in our team. Thus, if you’ve got moment to try and test them on yours, we’d be greatful. We’re especially interested in the following information:
You can send us this feedback through various channels:
You can download Audacity 3.7.4 here and the OpenVINO plugin there. We will also have them show up in the Get Effects button inside Audacity in the near future.
From our testing, it appears that in some cases, the Intel binaries perform better, even on Apple Silicon macs. You may want to experiment with what binary you use.
The model downloader and installer supports macOS 12 onwards. If you compile from source or get the models from elsewhere, you might be able to get it running from OSX 10.15 (Intel macs) or macOS 11 (Apple Silicon macs) as well.
By Leo Wattenberg
Wednesday, May 28, 2025On this day, 25 years ago, the very first public version of Audacity was released, Audacity 0.8.
Audacity 0.8 was very different to what we have today: It couldn’t record, it couldn’t use plugins, and it could only export as WAV, AIFF, SF and AU.
![]()
Since then, a lot has happened. Audacity 1.0 was released two years later, sporting a logo and layout that’s still recognizable today. PCs have turned notably less boxy and beige, and are much faster as well. They’re so fast in fact, that many features which would have been unthinkable 25 years ago are now very much possible - and even expected. We have worked tirelessly to improve Audacity’s audio editing capabilities, adding features like realtime effects, non-destructive edits and time stretching, a master channel and even some AI-powered effects which are actually useful.
If you’re curious to learn more about Audacity’s history, our product owner Martin Keary released a video about it when he took over, and our designer Leo Wattenberg ran Audacity’s source code through a visualizer to show the evolution of files within Audacity.
We’re planning to release another minor patch (Audacity 3.7.4) in the next couple weeks, which among various bug fixes finally brings aforementioned AI effects to macOS.
In addition to that, we’re still working hard on Audacity 4.0, which won’t be quite yet a DAW – but will tackle a lot of UX snags, which made Audacity so far more annoying to use than necessary. We will soon post an update on what to expect exactly for Audacity 4.0.
After 25 years of making it rather difficult to send any money our way, we finally have opened up a merch store at merch.audacityteam.org. Every purchase made will help support our full-size development team, and accelerate Audacity’s progress to becoming not just the free option for audio editing - but the best option.
We’ll add more designs over the coming months - follow us on YouTube or join our Discord to get notified when new merch drops!
By Leo Wattenberg
Wednesday, October 30, 2024Audacity 3.7 has been released!
It features everyone’s favorite “bug fixes and performance improvements”. See the full changelog for details.
Other than that – there’s nothing exciting to see here. Which in itself is exciting! The reason for this very thin release is that we’ve focused most of our attention towards Audacity 4.0 instead! Audacity 4 will feature a complete remake of the UI and is still quite some ways out. We’ll update you on scope and progress on that over the coming months.
In the meantime: Check out the MuseHub for some cool plugins.
The Stable channel has been updated to 147.0.7727.24/.25 for Windows and Mac as part of our early stable release to a small percentage of users. A full list of changes in this build is available in the log.
You can find more details about early Stable releases here.
Interested in switching release channels? Find out how here. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.
Srinivas Sista
Google Chrome
Below are development builds for testing purposes.
Latest development build: 2.6.4.36 (April 3rd 2026)
Latest stable release build: 2.6.4
https://github.com/clsid2/mpc-hc/releases/tag/2.6.4
View two pages side-by-side in a single window with the new Split View feature that makes it easier to compare information, research topics or work across two pages at once. To create a split view, select one or two tabs and choose Add to Split View or Open in Split View.
![]()
Firefox now offers a free built-in VPN. Whether you’re using public Wi-Fi while traveling, searching for sensitive health information, or shopping for something personal, this feature gives you a simple way to stay protected. Once you sign in and turn it on, you can hide your location and IP address by routing it through a secure proxy while you browse in Firefox. You will get 50 GB of protection every month, with the option to turn it on or off for specific websites. This feature is progressively rolling out in the US, UK, Germany and France starting today.
![]()
Enterprise note: This feature is not available in enterprise environments and is not being rolled out to users with enterprise policies. While it can currently be enabled manually, administrators will have the ability to disable it via enterprise policy starting April 7. In the meantime, organizations can use the BlockAboutConfig policy to prevent manual enablement.
This feature is part of a progressive roll out.
Certain new Firefox features are released gradually. This means some users will see the feature before everyone does. This approach helps to get early feedback to catch bugs and improve behavior quickly, meaning more Firefox users overall have a better experience.
Many PDF files will now load significantly faster thanks to hardware acceleration.
Firefox now automatically blocks notifications and permanently revokes permissions for any website flagged as malicious by SafeBrowsing. This prevents unsafe sites from sending background notifications to users, commonly used for ads, spam or phishing.
You can now add a Share button to your toolbar via Customize Toolbar, making it easy to share the current tab using your Windows or macOS system sharing options.
Address Autofill is enabled for users in Australia, India, Italy, Poland and Austria.
Explore more of the web with new on-device translation support for Bosnian, Norwegian Bokmål, Serbian and Thai — plus improved accuracy for Croatian.
Tab notes feature that lets you attach a short note to a web page is now available in Firefox Labs. You can use notes to remember why you opened a page, what you planned to do next or any details you want to revisit later. Please give notes a try and share your feedback on what works well and what can be improved.
![]()
Increased robustness of HTTP/3 upload performance for unstable network conditions.
Various security fixes.
The TrustPanel combines the privacy and security panels accessed from the address bar to give the user one place to check the Privacy and Security settings of the current page. Learn more.
![]()
Security has been strengthened by tightening the requirements for JavaScript files that can be loaded in the parent process, providing additional defense in depth against potential threats.
On Linux, Firefox will now default to the XDG portal file picker if available, rather than the GTK3 one, which is usually better integrated with the user's desktop environment, and more powerful.
Firefox error pages have a fresh new look, with updated visuals that better match the overall feel of Firefox. The redesigned pages create a more cohesive experience while making it clearer what went wrong.
![]()
On Windows, Firefox will use the modern Windows.Devices.Geolocation API for geolocation instead of Windows 7 location API.
The toolbar of the Storage Inspector now has a button to delete all entries of the currently selected storage.
Besides each CSS declaration related to a computed value shown in the Computed view there's now an icon to jump to it in the Rules view.
showPicker() now supports text-based <input> elements with an associated <datalist>, displaying the autofill dropdown. See documentation.
The functions xywh() and rect() were previously implemented for the clip-path and offset-path properties. They are now also available for the shape-outside property.
Added support for the HTML attribute popover="hint".
Enabled media element pseudo-classes, such as :playing, :paused…
Enabled the spec-compliant HTMLMediaElement.captureStream() API.
Added support for closing popovers & dialogs with the Android Back Button, and implemented the CloseWatcher API for handling this in script.
The new Reporting API provides a generic reporting mechanism for web applications to use to make reports available based on various platform features (for example Content Security Policy, Permissions-Policy or feature deprecation reports) in a consistent manner.
With the release of Firefox 149, we are pleased to welcome the developers who contributed their first code change to Firefox in this release, 25 of whom were brand new volunteers! Please join us in thanking each of these diligent and enthusiastic individuals, and take a look at their contributions:
