First published: Fri Mar 22 2019(Updated: )
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow.
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <60.6.1 | 60.6.1 |
Mozilla Firefox ESR | <60.6.1 | 60.6.1 |
Mozilla Firefox | <66.0.1 | 66.0.1 |
Mozilla Firefox | <66.0.1 | |
Mozilla Firefox ESR | <60.6.1 | |
Mozilla Thunderbird | <60.6.1 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
debian/firefox | 133.0.3-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.5.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.5.0esr-1~deb12u1 128.5.0esr-1 128.5.1esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security flaw is CVE-2019-9810.
This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
The severity rating of CVE-2019-9810 is 8.8 (Critical).
To fix the CVE-2019-9810 vulnerability in Firefox, update to version 66.0.1 or later.
To fix the CVE-2019-9810 vulnerability in Thunderbird, update to version 60.6.1 or later.