ALT-BU-2017-3538-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2021-00213
Уязвимость браузера Mozilla Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки
BDU:2021-00216
Уязвимость браузера Mozilla Firefox, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-00235
Уязвимость браузера Mozilla Firefox, связанная с недостатками используемых мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки
Modified: 2024-11-21
CVE-2017-7832
The combined, single character, version of the letter 'i' with any of the potential accents in unicode, such as acute or grave, can be spoofed in the addressbar by the dotless version of 'i' followed by the same accent as a second character with most font sets. This allows for domain spoofing attacks because these combined domain names do not display as punycode. This vulnerability affects Firefox < 57.
Modified: 2024-11-21
CVE-2017-7835
Mixed content blocking of insecure (HTTP) sub-resources in a secure (HTTPS) document was not correctly applied for resources that redirect from HTTPS to HTTP, allowing content that should be blocked, such as scripts, to be loaded on a page. This vulnerability affects Firefox < 57.
Modified: 2024-11-21
CVE-2017-7840
JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox < 57.
Package libXcursor updated to version 1.1.15-alt1.M80P.1 for branch p8 in task 195756.
Closed vulnerabilities
BDU:2019-01625
Уязвимость функции _XcursorThemeInherits пакета libxcursor операционной системы Debian GNU/Linux, связанная с выходом операции за границы однобайтовой кучи, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-01287
Уязвимость пакета libXcursor, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-9262
_XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows remote attackers to cause denial of service or potentially code execution via a one-byte heap overflow.
- RHSA-2018:3059
- RHSA-2018:3059
- RHSA-2018:3505
- RHSA-2018:3505
- https://bugs.freedesktop.org/show_bug.cgi?id=90857
- https://bugs.freedesktop.org/show_bug.cgi?id=90857
- https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=897213f36baf6926daf6d192c709cf627aa5fd05
- https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=897213f36baf6926daf6d192c709cf627aa5fd05
- [debian-lts-announce] 20180818 [SECURITY] [DLA-1469-1] libxcursor security update
- [debian-lts-announce] 20180818 [SECURITY] [DLA-1469-1] libxcursor security update
- USN-3729-1
- USN-3729-1
Modified: 2024-11-21
CVE-2017-16612
libXcursor before 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland through 1.14.0.
- http://security.cucumberlinux.com/security/details.php?id=156
- http://security.cucumberlinux.com/security/details.php?id=156
- [oss-security] 20171128 CVE-2017-16612 libXcursor: heap overflows when parsing malicious files
- [oss-security] 20171128 CVE-2017-16612 libXcursor: heap overflows when parsing malicious files
- USN-3501-1
- USN-3501-1
- https://bugzilla.suse.com/show_bug.cgi?id=1065386
- https://bugzilla.suse.com/show_bug.cgi?id=1065386
- https://cgit.freedesktop.org/wayland/wayland/commit/?id=5d201df72f3d4f4cb8b8f75f980169b03507da38
- https://cgit.freedesktop.org/wayland/wayland/commit/?id=5d201df72f3d4f4cb8b8f75f980169b03507da38
- https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8
- https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1201-1] libxcursor security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1201-1] libxcursor security update
- https://lists.freedesktop.org/archives/wayland-devel/2017-November/035979.html
- https://lists.freedesktop.org/archives/wayland-devel/2017-November/035979.html
- [freedesktop-xorg-announce] 20171128 libXcursor 1.1.15
- [freedesktop-xorg-announce] 20171128 libXcursor 1.1.15
- GLSA-201801-04
- GLSA-201801-04
- USN-3622-1
- USN-3622-1
- DSA-4059
- DSA-4059
Closed vulnerabilities
BDU:2022-06035
Уязвимость библиотеки LibXfont, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-16611
In libXfont before 1.5.4 and libXfont2 before 2.0.3, a local attacker can open (but not read) files on the system as root, triggering tape rewinds, watchdogs, or similar mechanisms that can be triggered by opening files.
- http://security.cucumberlinux.com/security/details.php?id=155
- http://security.cucumberlinux.com/security/details.php?id=155
- [oss-security] 20171128 CVE-2017-16611 libXfont Open files with O_NOFOLLOW
- [oss-security] 20171128 CVE-2017-16611 libXfont Open files with O_NOFOLLOW
- USN-3500-1
- USN-3500-1
- https://bugzilla.suse.com/show_bug.cgi?id=1050459
- https://bugzilla.suse.com/show_bug.cgi?id=1050459
- [debian-lts-announce] 20220125 [SECURITY] [DLA 2901-1] libxfont security update
- [debian-lts-announce] 20220125 [SECURITY] [DLA 2901-1] libxfont security update
- [freedesktop-xorg-announce] 20171128 libXfont2 2.0.3
- [freedesktop-xorg-announce] 20171128 libXfont2 2.0.3
- [freedesktop-xorg-announce] 20171128 libXfont 1.5.4
- [freedesktop-xorg-announce] 20171128 libXfont 1.5.4
- GLSA-201801-10
- GLSA-201801-10
Closed vulnerabilities
BDU:2022-06035
Уязвимость библиотеки LibXfont, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-16611
In libXfont before 1.5.4 and libXfont2 before 2.0.3, a local attacker can open (but not read) files on the system as root, triggering tape rewinds, watchdogs, or similar mechanisms that can be triggered by opening files.
- http://security.cucumberlinux.com/security/details.php?id=155
- http://security.cucumberlinux.com/security/details.php?id=155
- [oss-security] 20171128 CVE-2017-16611 libXfont Open files with O_NOFOLLOW
- [oss-security] 20171128 CVE-2017-16611 libXfont Open files with O_NOFOLLOW
- USN-3500-1
- USN-3500-1
- https://bugzilla.suse.com/show_bug.cgi?id=1050459
- https://bugzilla.suse.com/show_bug.cgi?id=1050459
- [debian-lts-announce] 20220125 [SECURITY] [DLA 2901-1] libxfont security update
- [debian-lts-announce] 20220125 [SECURITY] [DLA 2901-1] libxfont security update
- [freedesktop-xorg-announce] 20171128 libXfont2 2.0.3
- [freedesktop-xorg-announce] 20171128 libXfont2 2.0.3
- [freedesktop-xorg-announce] 20171128 libXfont 1.5.4
- [freedesktop-xorg-announce] 20171128 libXfont 1.5.4
- GLSA-201801-10
- GLSA-201801-10
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-8816
The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
- http://security.cucumberlinux.com/security/details.php?id=161
- http://security.cucumberlinux.com/security/details.php?id=161
- 101998
- 101998
- 1039896
- 1039896
- 1040608
- 1040608
- RHSA-2018:3558
- RHSA-2018:3558
- https://curl.haxx.se/docs/adv_2017-12e7.html
- https://curl.haxx.se/docs/adv_2017-12e7.html
- GLSA-201712-04
- GLSA-201712-04
- DSA-4051
- DSA-4051
Modified: 2024-11-21
CVE-2017-8817
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
- http://security.cucumberlinux.com/security/details.php?id=162
- http://security.cucumberlinux.com/security/details.php?id=162
- 102057
- 102057
- 1039897
- 1039897
- RHSA-2018:3558
- RHSA-2018:3558
- https://curl.haxx.se/docs/adv_2017-ae72.html
- https://curl.haxx.se/docs/adv_2017-ae72.html
- [debian-lts-announce] 20171130 [SECURITY] [DLA 1195-1] curl security update
- [debian-lts-announce] 20171130 [SECURITY] [DLA 1195-1] curl security update
- GLSA-201712-04
- GLSA-201712-04
- DSA-4051
- DSA-4051
Modified: 2024-11-21
CVE-2017-8818
curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library.