Security researchers Chris Rohlf and Yan Ivnitskiy of Matasano Security reported that when a JavaScript Array object had its length set to an extremely large value, the iteration of array elements that occurs when its reduceRight method was subsequently called could result in the execution of attacker controlled memory due to an invalid index value being used to access element properties.
Public now via: [1] http://www.mozilla.org/security/announce/2011/mfsa2011-22.html
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2011:0887 https://rhn.redhat.com/errata/RHSA-2011-0887.html
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2011:0888 https://rhn.redhat.com/errata/RHSA-2011-0888.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 4 Via RHSA-2011:0885 https://rhn.redhat.com/errata/RHSA-2011-0885.html