The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-17005.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "71.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "68.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "68.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19.10"
}
]
}
]