Bug 1779435 (CVE-2019-17005)

Summary: CVE-2019-17005 Mozilla: Buffer overflow in plain text serializer
Product: [Other] Security Response Reporter: Doran Moppert <dmoppert>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: cschalle, gecko-bugs-nobody, jhorak, stransky
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: firefox 68.3, thunderbird 68.3 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-12-05 19:04:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1777117, 1777118, 1777119, 1777120, 1777121, 1777124, 1777125, 1777126, 1777127, 1777128, 1780433, 1780992    
Bug Blocks: 1777115    

Description Doran Moppert 2019-12-04 00:36:12 UTC
The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash.



External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/#CVE-2019-17005

Comment 1 Doran Moppert 2019-12-04 00:36:15 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Mirko Brodesser

Comment 2 errata-xmlrpc 2019-12-05 16:02:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2019:4108 https://access.redhat.com/errata/RHSA-2019:4108

Comment 3 errata-xmlrpc 2019-12-05 16:19:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:4107 https://access.redhat.com/errata/RHSA-2019:4107

Comment 4 errata-xmlrpc 2019-12-05 16:39:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2019:4111 https://access.redhat.com/errata/RHSA-2019:4111

Comment 5 Product Security DevOps Team 2019-12-05 19:04:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-17005

Comment 8 errata-xmlrpc 2019-12-10 11:58:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2019:4148 https://access.redhat.com/errata/RHSA-2019:4148

Comment 9 errata-xmlrpc 2019-12-10 19:27:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2019:4195 https://access.redhat.com/errata/RHSA-2019:4195

Comment 10 errata-xmlrpc 2019-12-11 10:30:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2019:4205 https://access.redhat.com/errata/RHSA-2019:4205

Comment 12 errata-xmlrpc 2020-01-30 09:02:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:0292 https://access.redhat.com/errata/RHSA-2020:0292

Comment 13 errata-xmlrpc 2020-01-30 10:02:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:0295 https://access.redhat.com/errata/RHSA-2020:0295