ALT-BU-2017-3361-11
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-0380
The rend_service_intro_established function in or/rendservice.c in Tor before 0.2.8.15, 0.2.9.x before 0.2.9.12, 0.3.0.x before 0.3.0.11, 0.3.1.x before 0.3.1.7, and 0.3.2.x before 0.3.2.1-alpha, when SafeLogging is disabled, allows attackers to obtain sensitive information by leveraging access to the log files of a hidden service, because uninitialized stack data is included in an error message about construction of an introduction point circuit.
- http://www.debian.org/security/2017/dsa-3993
- http://www.securitytracker.com/id/1039519
- https://github.com/torproject/tor/commit/09ea89764a4d3a907808ed7d4fe42abfe64bd486
- https://trac.torproject.org/projects/tor/ticket/23490
- http://www.debian.org/security/2017/dsa-3993
- http://www.securitytracker.com/id/1039519
- https://github.com/torproject/tor/commit/09ea89764a4d3a907808ed7d4fe42abfe64bd486
- https://trac.torproject.org/projects/tor/ticket/23490
Closed vulnerabilities
Modified: 2021-03-23
BDU:2017-02024
Уязвимость в ext/standard/var_unserializer.re гипертекстового процессора PHP, позволяющая нарушителю оказать неопределенное воздействие на целостность данных
Modified: 2025-04-20
CVE-2017-12932
ext/standard/var_unserializer.re in PHP 7.0.x through 7.0.22 and 7.1.x through 7.1.8 is prone to a heap use after free while unserializing untrusted data, related to improper use of the hash API for key deletion in a situation with an invalid array size. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
- http://php.net/ChangeLog-7.php
- http://www.securityfocus.com/bid/100427
- https://access.redhat.com/errata/RHSA-2018:1296
- https://access.redhat.com/errata/RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74103
- https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4
- https://security.gentoo.org/glsa/201709-21
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.debian.org/security/2018/dsa-4080
- http://php.net/ChangeLog-7.php
- http://www.securityfocus.com/bid/100427
- https://access.redhat.com/errata/RHSA-2018:1296
- https://access.redhat.com/errata/RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74103
- https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4
- https://security.gentoo.org/glsa/201709-21
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.debian.org/security/2018/dsa-4080
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-5111
A use after free in PDFium in Google Chrome prior to 61.0.3163.79 for Linux, Windows, and Mac allowed a remote attacker to potentially exploit memory corruption via a crafted PDF file.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/737023
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/737023
- https://security.gentoo.org/glsa/201709-15
Modified: 2025-04-20
CVE-2017-5112
Heap buffer overflow in WebGL in Google Chrome prior to 61.0.3163.79 for Windows allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/740603
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/740603
- https://security.gentoo.org/glsa/201709-15
Modified: 2025-04-20
CVE-2017-5113
Math overflow in Skia in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/747043
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/747043
- https://security.gentoo.org/glsa/201709-15
Modified: 2025-04-20
CVE-2017-5114
Inappropriate use of partition alloc in PDFium in Google Chrome prior to 61.0.3163.79 for Linux, Windows, and Mac, and 61.0.3163.81 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted PDF file.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/752829
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/752829
- https://security.gentoo.org/glsa/201709-15
Modified: 2025-04-20
CVE-2017-5115
Type confusion in V8 in Google Chrome prior to 61.0.3163.79 for Windows allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/744584
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/744584
- https://security.gentoo.org/glsa/201709-15
Modified: 2025-04-20
CVE-2017-5116
Type confusion in V8 in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/759624
- https://security.gentoo.org/glsa/201709-15
- https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/759624
- https://security.gentoo.org/glsa/201709-15
- https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html
Modified: 2025-04-20
CVE-2017-5117
Use of an uninitialized value in Skia in Google Chrome prior to 61.0.3163.79 for Linux and Windows allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/739190
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/739190
- https://security.gentoo.org/glsa/201709-15
Modified: 2025-04-20
CVE-2017-5118
Blink in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, failed to correctly propagate CSP restrictions to javascript scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/747847
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/747847
- https://security.gentoo.org/glsa/201709-15
Modified: 2025-04-20
CVE-2017-5119
Use of an uninitialized value in Skia in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/725127
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/725127
- https://security.gentoo.org/glsa/201709-15
Modified: 2025-04-20
CVE-2017-5120
Inappropriate use of www mismatch redirects in browser navigation in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to potentially downgrade HTTPS requests to HTTP via a crafted HTML page. In other words, Chrome could transmit cleartext even though the user had entered an https URL, because of a misdesigned workaround for cases where the domain name in a URL almost matches the domain name in an X.509 server certificate (but differs in the initial "www." substring).
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/718676
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3985
- http://www.securityfocus.com/bid/100610
- http://www.securitytracker.com/id/1039291
- https://access.redhat.com/errata/RHSA-2017:2676
- https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
- https://crbug.com/718676
- https://security.gentoo.org/glsa/201709-15
