Description
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4310-1 | firefox-esr security update |
Ubuntu USN |
USN-3778-1 | Firefox vulnerabilities |
References
History
Tue, 25 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Mozilla firefox Esr
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Mozilla
Subscribe
Firefox
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-05T08:30:59.795Z
Reserved: 2018-06-14T00:00:00.000Z
Link: CVE-2018-12387
No data.
Status : Modified
Published: 2018-10-18T13:29:06.400
Modified: 2025-11-25T17:50:16.803
Link: CVE-2018-12387
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN