vulnerability
Arch Linux: Arbitrary code execution (CVE-2019-9791)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Apr 26, 2019 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Apr 26, 2019
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
The type inference system in Firefox before 66.0 allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash.
Solution
arch-linux-upgrade-latest
References
- CVE-2019-9791
- https://attackerkb.com/topics/CVE-2019-9791
- URL-https://access.redhat.com/errata/RHSA-2019:0966
- URL-https://access.redhat.com/errata/RHSA-2019:1144
- URL-https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- URL-https://security.archlinux.org/ASA-201903-11
- URL-https://www.mozilla.org/en-US/security/advisories/mfsa2019-07/
- URL-https://www.mozilla.org/security/advisories/mfsa2019-07/
- URL-https://www.mozilla.org/security/advisories/mfsa2019-08/
- URL-https://www.mozilla.org/security/advisories/mfsa2019-11/
- CWE-843
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.