#11857 closed enhancement (fixed)
thunderbird-60.6.1
| Reported by: | Bruce Dubbs | Owned by: | Tim Tassonis |
|---|---|---|---|
| Priority: | highest | Milestone: | 9.0 |
| Component: | BOOK | Version: | SVN |
| Severity: | normal | Keywords: | |
| Cc: |
Description
New point version.
Change History (4)
comment:1 by , 7 years ago
| Priority: | normal → highest |
|---|
comment:2 by , 7 years ago
| Owner: | changed from to |
|---|---|
| Status: | new → assigned |
Note:
See TracTickets
for help on using tickets.

Security vulnerabilities fixed in Thunderbird 60.6.1 Announced March 25, 2019 Impact critical Products Thunderbird Fixed in Thunderbird 60.6.1 In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. #CVE-2019-9810: IonMonkey MArraySlice has incorrect alias information Reporter Richard Zhu and Amat Cama via Trend Micro's Zero Day Initiative Impact critical Description Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. References Bug 1537924 #CVE-2019-9813: Ionmonkey type confusion with __proto__ mutations Reporter Niklas Baumstark via Trend Micro's Zero Day Initiative Impact critical Description Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. References Bug 1538006Same two zero-days in Firefox