A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 999 | all | firefox | < 62.0.3-1 | firefox_62.0.3-1_all.deb |
Debian | 12 | all | firefox-esr | < 60.2.2esr-1 | firefox-esr_60.2.2esr-1_all.deb |
Debian | 11 | all | firefox-esr | < 60.2.2esr-1 | firefox-esr_60.2.2esr-1_all.deb |
Debian | 10 | all | firefox-esr | < 60.2.2esr-1 | firefox-esr_60.2.2esr-1_all.deb |
Debian | 999 | all | firefox-esr | < 60.2.2esr-1 | firefox-esr_60.2.2esr-1_all.deb |
Debian | 13 | all | firefox-esr | < 60.2.2esr-1 | firefox-esr_60.2.2esr-1_all.deb |