ALT-BU-2017-3287-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-1000420
Syncthing version 0.14.33 and older is vulnerable to symlink traversal resulting in arbitrary file overwrite
Closed bugs
начал ругаться на заведомо несуществующее устройство
Package postgresql9.6-1C updated to version 9.6.4-alt1 for branch sisyphus in task 186866.
Closed vulnerabilities
BDU:2017-02037
Уязвимость системы управления базами данных PostgreSQL, вызванная недостатками процедуры авторизации, позволяющая нарушителю получить пароль
Modified: 2024-11-21
CVE-2017-7547
PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
Package postgresql9.6 updated to version 9.6.4-alt1 for branch sisyphus in task 186866.
Closed vulnerabilities
BDU:2017-02037
Уязвимость системы управления базами данных PostgreSQL, вызванная недостатками процедуры авторизации, позволяющая нарушителю получить пароль
Modified: 2024-11-21
CVE-2017-7547
PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
Package postgresql9.5 updated to version 9.5.8-alt1 for branch sisyphus in task 186866.
Closed vulnerabilities
BDU:2017-02037
Уязвимость системы управления базами данных PostgreSQL, вызванная недостатками процедуры авторизации, позволяющая нарушителю получить пароль
Modified: 2024-11-21
CVE-2017-7547
PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
Package postgresql9.4 updated to version 9.4.13-alt1 for branch sisyphus in task 186866.
Closed vulnerabilities
BDU:2017-02037
Уязвимость системы управления базами данных PostgreSQL, вызванная недостатками процедуры авторизации, позволяющая нарушителю получить пароль
Modified: 2024-11-21
CVE-2017-7547
PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
Package postgresql9.3 updated to version 9.3.18-alt1 for branch sisyphus in task 186866.
Closed vulnerabilities
BDU:2017-02037
Уязвимость системы управления базами данных PostgreSQL, вызванная недостатками процедуры авторизации, позволяющая нарушителю получить пароль
Modified: 2024-11-21
CVE-2017-7547
PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
Package pve-manager updated to version 5.0.24-alt7 for branch sisyphus in task 186898.
Closed bugs
Не работает настройка резервного копирования контейнера
Package firefox-esr updated to version 52.3.0-alt1 for branch sisyphus in task 186871.
Closed vulnerabilities
BDU:2018-00163
Уязвимость компонента Developer Tools браузера Mozilla Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2018-00164
Уязвимость реализации технологии WebSockets браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00165
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00166
Уязвимость функции nsImageLoadingContent::Notify браузера Mozilla Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-00167
Уязвимость функции mozilla::dom::ImageDocument::UpdateSizeFromLayout браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00168
Уязвимость функции mozilla::a11y::DocAccessible::PutChildrenBack браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00169
Уязвимость функции mozilla::SVGGeometryFrame::GetCanvasTM() браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00170
Уязвимость браузера Mozilla Firefox ESR, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-00171
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками в реализации SOP (Same-origin policy), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2018-00172
Уязвимость механизма AppCache браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю осуществить подмену домена
BDU:2018-00173
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00174
Уязвимость реализации протокола «data:» браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации
BDU:2018-00175
Уязвимость реализации механизма CSP (Content Security Policy) браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2018-00176
Уязвимость браузера Mozilla Firefox ESR, связанная с ошибками при работе с памятью, позволяющая нарушителю выполнить произвольный код
BDU:2021-00026
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при манипулировании элементами DOM, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00027
Уязвимость функции деструктора класса WindowsDllDetourPatcher браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю повысить свои привилегии
BDU:2021-00040
Уязвимость реализации класса WindowsDllDetourPatcher браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю нарушить целостность данных
Modified: 2024-11-21
CVE-2017-7753
An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100315
- 100315
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1353312
- https://bugzilla.mozilla.org/show_bug.cgi?id=1353312
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7779
Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100201
- 100201
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7782
An error in the "WindowsDllDetourPatcher" where a RWX ("Read/Write/Execute") 4k block is allocated but never protected, violating DEP protections. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100243
- 100243
- 1039124
- 1039124
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344034
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344034
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7784
A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100202
- 100202
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376087
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376087
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7785
A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100206
- 100206
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356985
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356985
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7786
A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100206
- 100206
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365189
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365189
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7787
Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100234
- 100234
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322896
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322896
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7791
On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100240
- 100240
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365875
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365875
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7792
A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100206
- 100206
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1368652
- https://bugzilla.mozilla.org/show_bug.cgi?id=1368652
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7798
The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR < 52.3 and Firefox < 55.
- 100198
- 100198
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1371586%2C1372112
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1371586%2C1372112
- DSA-3928
- DSA-3928
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
Modified: 2024-11-21
CVE-2017-7800
A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100196
- 100196
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1374047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1374047
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7801
A use-after-free vulnerability can occur while re-computing layout for a "marquee" element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100197
- 100197
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371259
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371259
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7802
A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100202
- 100202
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1378147
- https://bugzilla.mozilla.org/show_bug.cgi?id=1378147
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7803
When a page's content security policy (CSP) header contains a "sandbox" directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100234
- 100234
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377426
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377426
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7804
The destructor function for the "WindowsDllDetourPatcher" class can be re-purposed by malicious code in concert with another vulnerability to write arbitrary data to an attacker controlled location in memory. This can be used to bypass existing memory protections in this situation. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100234
- 100234
- 1039124
- 1039124
- https://bugzilla.mozilla.org/show_bug.cgi?id=1372849
- https://bugzilla.mozilla.org/show_bug.cgi?id=1372849
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7807
A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100242
- 100242
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376459
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376459
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7809
A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100203
- 100203
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380284
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380284
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Closed vulnerabilities
BDU:2017-02613
Уязвимость реализации PPAPI браузера Google Chrome, позволяющая нарушителю выйти из изолированной среды
BDU:2017-02614
Уязвимость реализации IndexedDB браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю воздействовать на конфиденциальность, целостность и доступность данных
Modified: 2024-11-21
CVE-2017-5091
A use after free in IndexedDB in Google Chrome prior to 60.0.3112.78 for Linux, Android, Windows, and Mac allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/728887
- https://crbug.com/728887
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5092
Insufficient validation of untrusted input in PPAPI Plugins in Google Chrome prior to 60.0.3112.78 for Windows allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/733549
- https://crbug.com/733549
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5093
Inappropriate implementation in modal dialog handling in Blink in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to prevent a full screen warning from being displayed via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/550017
- https://crbug.com/550017
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5094
Type confusion in extensions JavaScript bindings in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/702946
- https://crbug.com/702946
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5095
Stack overflow in PDFium in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to potentially exploit stack corruption via a crafted PDF file.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/732661
- https://crbug.com/732661
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5096
Insufficient policy enforcement during navigation between different schemes in Google Chrome prior to 60.0.3112.78 for Android allowed a remote attacker to perform cross origin content download via a crafted HTML page, related to intents.
Modified: 2024-11-21
CVE-2017-5097
Insufficient validation of untrusted input in Skia in Google Chrome prior to 60.0.3112.78 for Linux allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/740789
- https://crbug.com/740789
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5098
A use after free in V8 in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/740803
- https://crbug.com/740803
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5099
Insufficient validation of untrusted input in PPAPI Plugins in Google Chrome prior to 60.0.3112.78 for Mac allowed a remote attacker to potentially gain privilege elevation via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/733548
- https://crbug.com/733548
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5100
A use after free in Apps in Google Chrome prior to 60.0.3112.78 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/718292
- https://crbug.com/718292
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5101
Inappropriate implementation in Omnibox in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/681740
- https://crbug.com/681740
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5102
Use of an uninitialized value in Skia in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/727678
- https://crbug.com/727678
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5103
Use of an uninitialized value in Skia in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/726199
- https://crbug.com/726199
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5104
Inappropriate implementation in interstitials in Google Chrome prior to 60.0.3112.78 for Mac allowed a remote attacker to spoof the contents of the omnibox via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/729105
- https://crbug.com/729105
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5105
Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/729979
- https://crbug.com/729979
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5106
Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/714628
- https://crbug.com/714628
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5107
A timing attack in SVG rendering in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to extract pixel values from a cross-origin page being iframe'd via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/686253
- https://crbug.com/686253
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5108
Type confusion in PDFium in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted PDF file.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/695830
- https://crbug.com/695830
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5109
Inappropriate implementation of unload handler handling in permission prompts in Google Chrome prior to 60.0.3112.78 for Linux, Windows, and Mac allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/710400
- https://crbug.com/710400
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-5110
Inappropriate implementation of the web payments API on blob: and data: schemes in Web Payments in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page.
- DSA-3926
- DSA-3926
- 99950
- 99950
- RHSA-2017:1833
- RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
- https://crbug.com/717476
- https://crbug.com/717476
- GLSA-201709-15
- GLSA-201709-15
Modified: 2024-11-21
CVE-2017-7000
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. The issue involves the "SQLite" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.