mozilla firefox is vulnerable to arbitrary code execution. Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion.
packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html
access.redhat.com/errata/RHSA-2020:0086
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=1607443
security.gentoo.org/glsa/202003-02
usn.ubuntu.com/4335-1/
www.mozilla.org/en-US/security/advisories/mfsa2020-02/
www.mozilla.org/security/advisories/mfsa2020-03/
www.mozilla.org/security/advisories/mfsa2020-04/