vulnerability
Arch Linux: Arbitrary code execution (CVE-2019-9793)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Apr 26, 2019 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Apr 26, 2019
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A mechanism was discovered in Firefox before 66.0 that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. Note that Spectre mitigations are currently enabled for all users by default settings.
Solution
arch-linux-upgrade-latest
References
- CVE-2019-9793
- https://attackerkb.com/topics/CVE-2019-9793
- URL-https://access.redhat.com/errata/RHSA-2019:0966
- URL-https://access.redhat.com/errata/RHSA-2019:1144
- URL-https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- URL-https://security.archlinux.org/ASA-201903-11
- URL-https://www.mozilla.org/en-US/security/advisories/mfsa2019-07/
- URL-https://www.mozilla.org/security/advisories/mfsa2019-07/
- URL-https://www.mozilla.org/security/advisories/mfsa2019-08/
- URL-https://www.mozilla.org/security/advisories/mfsa2019-11/
- CWE-119
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.