ALT-BU-2017-3490-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2021-05256
Уязвимость компонента xmlmemory.c программного обеспечения для анализа XML-документов libxml2, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-15386
Incorrect implementation in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/752003
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/752003
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15387
Insufficient enforcement of Content Security Policy in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to open javascript: URL windows when they should not be allowed to via a crafted HTML page.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/756040
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/756040
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15388
Iteration through non-finite points in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/756563
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/756563
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15389
An insufficient watchdog timer in navigation in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/739621
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/739621
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15390
Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/750239
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/750239
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15391
Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to access Extension pages without authorisation via a crafted HTML page.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/598265
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/598265
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15392
Insufficient data validation in V8 in Google Chrome prior to 62.0.3202.62 allowed an attacker who can write to the Windows Registry to potentially exploit heap corruption via a crafted Windows Registry entry, related to PlatformIntegration.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/714401
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/714401
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15393
Insufficient Policy Enforcement in Devtools remote debugging in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to obtain access to remote debugging functionality via a crafted HTML page, aka a Referer leak.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/732751
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/732751
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15394
Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/745580
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/745580
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15395
A use after free in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an ImageCapture NULL pointer dereference.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/759457
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/759457
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15396
A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://bugs.icu-project.org/trac/changeset/40494
- http://www.securityfocus.com/bid/101597
- https://access.redhat.com/errata/RHSA-2017:3082
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html
- https://crbug.com/770452
- https://security.gentoo.org/glsa/201711-02
- https://www.debian.org/security/2017/dsa-4020
- http://bugs.icu-project.org/trac/changeset/40494
- http://www.securityfocus.com/bid/101597
- https://access.redhat.com/errata/RHSA-2017:3082
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html
- https://crbug.com/770452
- https://security.gentoo.org/glsa/201711-02
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-15401
A memory corruption bug in WebAssembly could lead to out of bounds read and write through V8 in WebAssembly in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Modified: 2024-11-21
CVE-2017-15404
An ability to process crash dumps under root privileges and inappropriate symlinks handling could lead to a local privilege escalation in Crash Reporting in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to perform privilege escalation via a crafted HTML page.
Modified: 2024-11-21
CVE-2017-15405
Inappropriate symlink handling and a race condition in the stateful recovery feature implementation could lead to a persistance established by a malicious code running with root privileges in cryptohomed in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to execute arbitrary code via a crafted HTML page.
Modified: 2024-11-21
CVE-2017-15406
A stack buffer overflow in V8 in Google Chrome prior to 62.0.3202.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Modified: 2024-11-21
CVE-2017-5124
Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted MHTML page.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://chromium.googlesource.com/chromium/src/+/4558c2885e618557a674660aff57404d25537070
- https://crbug.com/762930
- https://github.com/Bo0oM/CVE-2017-5124
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- https://www.reddit.com/r/netsec/comments/7cus2h/chrome_61_uxss_exploit_cve20175124/
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://chromium.googlesource.com/chromium/src/+/4558c2885e618557a674660aff57404d25537070
- https://crbug.com/762930
- https://github.com/Bo0oM/CVE-2017-5124
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- https://www.reddit.com/r/netsec/comments/7cus2h/chrome_61_uxss_exploit_cve20175124/
Modified: 2024-11-21
CVE-2017-5125
Heap buffer overflow in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/749147
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/749147
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-5126
A use after free in PDFium in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/760455
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/760455
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-5127
Use after free in PDFium in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/765384
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/765384
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-5128
Heap buffer overflow in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, related to WebGL.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/765469
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/765469
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-5129
A use after free in WebAudio in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/765495
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/765495
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-5130
An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.
- http://bugzilla.gnome.org/show_bug.cgi?id=783026
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/722079
- https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
- https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
- https://security.gentoo.org/glsa/201710-24
- https://security.netapp.com/advisory/ntap-20190719-0001/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://bugzilla.gnome.org/show_bug.cgi?id=783026
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/722079
- https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
- https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
- https://security.gentoo.org/glsa/201710-24
- https://security.netapp.com/advisory/ntap-20190719-0001/
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2017-5131
An integer overflow in Skia in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an out-of-bounds write.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/744109
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/744109
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-5132
Inappropriate implementation in V8 in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka incorrect WebAssembly stack manipulation.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/718858
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/718858
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Modified: 2024-11-21
CVE-2017-5133
Off-by-one read/write on the heap in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to corrupt memory and possibly leak information and potentially execute code via a crafted PDF file.
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/762106
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
- http://www.securityfocus.com/bid/101482
- https://access.redhat.com/errata/RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/762106
- https://security.gentoo.org/glsa/201710-24
- https://www.debian.org/security/2017/dsa-4020
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-10742
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133