Mozilla Thunderbird is vulnerable to buffer overflow. It does not use correct alias information in IonMonkey JIT compiler for MArraySlice in Array.prototype.slice method.
packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
access.redhat.com/errata/RHSA-2019:0680
access.redhat.com/errata/RHSA-2019:0966
access.redhat.com/errata/RHSA-2019:1144
access.redhat.com/security/updates/classification/#important
bugzilla.mozilla.org/show_bug.cgi?id=1537924
www.mozilla.org/en-US/security/advisories/mfsa2019-11/
www.mozilla.org/en-US/security/advisories/mfsa2019-12/
www.mozilla.org/security/advisories/mfsa2019-09/
www.mozilla.org/security/advisories/mfsa2019-10/
www.mozilla.org/security/advisories/mfsa2019-12/