The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/#CVE-2019-17005
Acknowledgments: Name: the Mozilla project Upstream: Mirko Brodesser
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:4108 https://access.redhat.com/errata/RHSA-2019:4108
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:4107 https://access.redhat.com/errata/RHSA-2019:4107
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:4111 https://access.redhat.com/errata/RHSA-2019:4111
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-17005
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:4148 https://access.redhat.com/errata/RHSA-2019:4148
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:4195 https://access.redhat.com/errata/RHSA-2019:4195
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:4205 https://access.redhat.com/errata/RHSA-2019:4205
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0292 https://access.redhat.com/errata/RHSA-2020:0292
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0295 https://access.redhat.com/errata/RHSA-2020:0295