First published: Fri Mar 22 2019(Updated: )
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow.
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <60.6.1 | 60.6.1 |
Firefox | <66.0.1 | |
Firefox ESR | <60.6.1 | |
Thunderbird | <60.6.1 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Firefox | <66.0.1 | 66.0.1 |
Firefox ESR | <60.6.1 | 60.6.1 |
debian/firefox | 138.0.1-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.9.0esr-1~deb11u1 128.8.0esr-1~deb12u1 128.10.0esr-1~deb12u1 128.9.0esr-2 128.10.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security flaw is CVE-2019-9810.
This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
The severity rating of CVE-2019-9810 is 8.8 (Critical).
To fix the CVE-2019-9810 vulnerability in Firefox, update to version 66.0.1 or later.
To fix the CVE-2019-9810 vulnerability in Thunderbird, update to version 60.6.1 or later.