https://tails.boum.org/news/version_1.5/index.en.html
Tails, The Amnesic Incognito Live System, version 1.5, is out.
This release fixes numerous security issues and all users must upgrade as soon as possible.
Changes Known issues Download or upgrade What's coming up?
Changes New features
Disable access to the local network in the Tor Browser. You should now use the Unsafe Browser to access the local network.
Upgrades and changes
Install Tor Browser 5.0 (based on Firefox 38esr). Install a 32-bit GRUB EFI boot loader. Tails should now start on some tablets with Intel Bay Trail processors among others. Let the user know when Tails Installer has rejected a device because it is too small.
There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog. Fixed problems
Our AppArmor setup has been audited and improved in various ways which should harden the system. The network should now be properly disabled when MAC address spoofing fails.
Known issues
See the current list of known issues. Download or upgrade
Go to the download page. What's coming up?
The next Tails release is scheduled for September 22.
Have a look to our roadmap to see where we are heading to.
Do you want to help? There are many ways you can contribute to Tails, for example by donating. If you want to help, come talk to us!
https://tails.boum.org/security/Numerous_security_holes_in_1.4.1/index.en.html
Numerous security holes in Tails 1.4.1
Several security holes that affect Tails 1.4.1 are now fixed in Tails 1.5.
We strongly encourage you to upgrade to Tails 1.5 as soon as possible. Details
Tor Browser: Mozilla Foundation Security Advisory 2015-79, Mozilla Foundation Security Advisory 2015-80, Mozilla Foundation Security Advisory 2015-82, Mozilla Foundation Security Advisory 2015-83, Mozilla Foundation Security Advisory 2015-85, Mozilla Foundation Security Advisory 2015-87, Mozilla Foundation Security Advisory 2015-88, Mozilla Foundation Security Advisory 2015-89, Mozilla Foundation Security Advisory 2015-90, Mozilla Foundation Security Advisory 2015-92 Linux: Debian Security Advisory 3313, CVE-2015-3290, CVE-2015-3291, CVE-2015-4167, CVE-2015-5157, CVE-2015-5364, CVE-2015-5366, Debian Security Advisory 3329, CVE-2015-1333, CVE-2015-3212, CVE-2015-4692, CVE-2015-4700, CVE-2015-5364, CVE-2015-5366, CVE-2015-5697, CVE-2015-5706, CVE-2015-5707 ghostscript: Debian Security Advisory 3326 CVE-2015-3228 bind9-host: Debian Security Advisory 3319, CVE-2015-5477 Debian Security Advisory 3304, CVE-2015-4620 expat: Debian Security Advisory 3318, CVE-2015-1283 cups-filters: Debian Security Advisory 3303, CVE-2015-3258, CVE-2015-3279 icu: Debian Security Advisory 3323, CVE-2014-6585, CVE-2014-8146, CVE-2014-8147, CVE-2015-4760 wmf: Debian Security Advisory 3302, CVE-2015-0848, CVE-2015-4588, CVE-2015-4695, CVE-2015-4696 openjdk-7: Debian Security Advisory 3316, CVE-2014-8873, CVE-2015-0460, CVE-2015-0469, CVE-2015-0470, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-2590, CVE-2015-2601, CVE-2015-2613, CVE-2015-2621, CVE-2015-2625, CVE-2015-2628, CVE-2015-2632, CVE-2015-2808, CVE-2015-4000, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4748, CVE-2015-4749, CVE-2015-4760
Seems that there's an important Tor Browser update (to v5.0) as well. https://torproject.org