Note:
This project will be discontinued after December 13, 2021. [more]
2019-04-26
The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
Products | Firefox, Firefox_esr, Thunderbird, Enterprise_linux, Enterprise_linux_eus, Enterprise_linux_server_aus, Enterprise_linux_server_tus |
Type | Out-of-bounds Write (CWE-787) |
First patch | - None (likely due to unavailable code) |
Links |
• https://www.mozilla.org/security/advisories/mfsa2019-11/
• https://bugzilla.mozilla.org/show_bug.cgi?id=1532599 • https://access.redhat.com/errata/RHSA-2019:1144 • https://www.mozilla.org/security/advisories/mfsa2019-08/ • https://www.mozilla.org/security/advisories/mfsa2019-07/ |