First published: Tue Jul 28 2020(Updated: )
JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <78.1 | 78.1 |
Mozilla Thunderbird | <78.1 | 78.1 |
Mozilla Firefox | <79 | 79 |
Mozilla Firefox | <79.0 | |
Mozilla Firefox ESR | <78.1 | |
Mozilla Thunderbird | <78.1 | |
openSUSE Leap | =15.2 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
debian/firefox | 132.0.2-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.4.0esr-1~deb11u1 1:115.16.0esr-1~deb12u1 1:128.4.0esr-1~deb12u1 1:128.4.2esr-1 1:128.4.3esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2020-15656 is rated as moderate.
Mozilla Firefox ESR 78.1, Mozilla Thunderbird 78.1, and Mozilla Firefox up to version 79 are affected by CVE-2020-15656.
Apply the recommended remedy versions: Mozilla Firefox ESR 78.1, Mozilla Thunderbird 78.1, and Mozilla Firefox version up to 79.
You can find more information about CVE-2020-15656 on the following references: [Bugzilla Mozilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1647293), [Mozilla Security Advisory mfsa2020-33](https://www.mozilla.org/en-US/security/advisories/mfsa2020-33/), [Mozilla Security Advisory mfsa2020-30](https://www.mozilla.org/en-US/security/advisories/mfsa2020-30/)