A bug discovered last week in Firefox 3.5’s Just-in-time (JIT)
JavaScript compiler was disclosed publicly yesterday. It is a critical
vulnerability that can be used to execute malicious code.

There is a javascript.options.jit.content setting in SeaMonkey 2.0 as
well (none in 1.1.x). I've asked in mozilla.dev.apps.seamonkey if this
affects SM 2.x as well... no response yet, so I've set
javascript.options.jit.content to False on my SM 2.0's just to be on the
safe side.

support-seamonkey mailing list

Reply via email to