Описание
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 62.0.3+build1-0ubuntu0.18.04.1 |
| cosmic | released | 62.0.3+build1-0ubuntu1 |
| devel | released | 62.0.3+build1-0ubuntu1 |
| disco | released | 62.0.3+build1-0ubuntu1 |
| eoan | released | 62.0.3+build1-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [62.0.3+build1-0ubuntu0.14.04.2]] |
| esm-infra/focal | DNE | |
| focal | released | 62.0.3+build1-0ubuntu1 |
| groovy | released | 62.0.3+build1-0ubuntu1 |
| hirsute | released | 62.0.3+build1-0ubuntu1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| cosmic | DNE | |
| devel | DNE | |
| disco | DNE | |
| eoan | DNE | |
| esm-apps/bionic | ignored | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| groovy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| cosmic | ignored | end of life |
| devel | DNE | |
| disco | ignored | end of life |
| eoan | ignored | end of life |
| esm-apps/focal | ignored | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | ignored | |
| focal | ignored | |
| groovy | ignored | end of life |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1:60.4.0+build2-0ubuntu0.18.04.1 |
| cosmic | released | 1:60.4.0+build2-0ubuntu0.18.10.1 |
| devel | released | 1:60.4.0+build2-0ubuntu1 |
| disco | released | 1:60.4.0+build2-0ubuntu1 |
| eoan | released | 1:60.4.0+build2-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needs-triage] |
| esm-infra/focal | DNE | |
| focal | released | 1:60.4.0+build2-0ubuntu1 |
| groovy | released | 1:60.4.0+build2-0ubuntu1 |
| hirsute | released | 1:60.4.0+build2-0ubuntu1 |
Показывать по
6.4 Medium
CVSS2
9.1 Critical
CVSS3
Связанные уязвимости
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
A vulnerability where the JavaScript JIT compiler inlines Array.protot ...
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
6.4 Medium
CVSS2
9.1 Critical
CVSS3