Vulnerability Description
Insufficient validation of untrusted input in Skia in Google Chrome prior to 60.0.3112.78 for Linux allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chrome | <= 60.0.3112.76 | |
| Linux | Linux Kernel | - |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3926
- http://www.securityfocus.com/bid/99950
- https://access.redhat.com/errata/RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.
- https://crbug.com/740789
- https://security.gentoo.org/glsa/201709-15
- http://www.debian.org/security/2017/dsa-3926
- http://www.securityfocus.com/bid/99950
- https://access.redhat.com/errata/RHSA-2017:1833
- https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.
- https://crbug.com/740789
- https://security.gentoo.org/glsa/201709-15
FAQ
What is CVE-2017-5097?
CVE-2017-5097 is a vulnerability with a CVSS score of 8.8 (HIGH). Insufficient validation of untrusted input in Skia in Google Chrome prior to 60.0.3112.78 for Linux allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
How severe is CVE-2017-5097?
CVE-2017-5097 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5097?
Check the references section above for vendor advisories and patch information. Affected products include: Google Chrome, Linux Linux Kernel, Debian Debian Linux.