JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2020-30/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2020-32/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2020-33/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1647293 | vendor advisory issue tracking permissions required |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html | third party advisory vendor advisory |
https://usn.ubuntu.com/4443-1/ | third party advisory vendor advisory |