Описание
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 62.0.3+build1-0ubuntu0.18.04.1 |
cosmic | released | 62.0.3+build1-0ubuntu1 |
devel | released | 62.0.3+build1-0ubuntu1 |
disco | released | 62.0.3+build1-0ubuntu1 |
eoan | released | 62.0.3+build1-0ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [62.0.3+build1-0ubuntu0.14.04.2]] |
esm-infra/focal | DNE | |
focal | released | 62.0.3+build1-0ubuntu1 |
groovy | released | 62.0.3+build1-0ubuntu1 |
hirsute | released | 62.0.3+build1-0ubuntu1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-apps/bionic | ignored | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
cosmic | ignored | end of life |
devel | DNE | |
disco | ignored | end of life |
eoan | ignored | end of life |
esm-apps/focal | ignored | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | ignored | |
focal | ignored | |
groovy | ignored | end of life |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1:60.4.0+build2-0ubuntu0.18.04.1 |
cosmic | released | 1:60.4.0+build2-0ubuntu0.18.10.1 |
devel | released | 1:60.4.0+build2-0ubuntu1 |
disco | released | 1:60.4.0+build2-0ubuntu1 |
eoan | released | 1:60.4.0+build2-0ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needs-triage] |
esm-infra/focal | DNE | |
focal | released | 1:60.4.0+build2-0ubuntu1 |
groovy | released | 1:60.4.0+build2-0ubuntu1 |
hirsute | released | 1:60.4.0+build2-0ubuntu1 |
Показывать по
6.4 Medium
CVSS2
9.1 Critical
CVSS3
Связанные уязвимости
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
A vulnerability where the JavaScript JIT compiler inlines Array.protot ...
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
6.4 Medium
CVSS2
9.1 Critical
CVSS3