Debian dsa-5757 : chromium - security update

high Nessus Plugin ID 206163

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5757 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-5757-1 [email protected] https://www.debian.org/security/ Andres Salomon August 23, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : chromium CVE ID : CVE-2024-7964 CVE-2024-7965 CVE-2024-7966 CVE-2024-7967 CVE-2024-7968 CVE-2024-7969 CVE-2024-7971 CVE-2024-7972 CVE-2024-7973 CVE-2024-7974 CVE-2024-7975 CVE-2024-7976 CVE-2024-7977 CVE-2024-7978 CVE-2024-7979 CVE-2024-7980 CVE-2024-7981 CVE-2024-8033 CVE-2024-8034 CVE-2024-8035

Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.

For the stable distribution (bookworm), these problems have been fixed in version 128.0.6613.84-1~deb12u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the chromium packages.

See Also

https://security-tracker.debian.org/tracker/source-package/chromium

https://packages.debian.org/source/bookworm/chromium

https://security-tracker.debian.org/tracker/CVE-2024-7964

https://security-tracker.debian.org/tracker/CVE-2024-7965

https://security-tracker.debian.org/tracker/CVE-2024-7966

https://security-tracker.debian.org/tracker/CVE-2024-7967

https://security-tracker.debian.org/tracker/CVE-2024-7968

https://security-tracker.debian.org/tracker/CVE-2024-7969

https://security-tracker.debian.org/tracker/CVE-2024-7971

https://security-tracker.debian.org/tracker/CVE-2024-7972

https://security-tracker.debian.org/tracker/CVE-2024-7973

https://security-tracker.debian.org/tracker/CVE-2024-7974

https://security-tracker.debian.org/tracker/CVE-2024-7975

https://security-tracker.debian.org/tracker/CVE-2024-7976

https://security-tracker.debian.org/tracker/CVE-2024-7977

https://security-tracker.debian.org/tracker/CVE-2024-7978

https://security-tracker.debian.org/tracker/CVE-2024-7979

https://security-tracker.debian.org/tracker/CVE-2024-7980

https://security-tracker.debian.org/tracker/CVE-2024-7981

https://security-tracker.debian.org/tracker/CVE-2024-8033

https://security-tracker.debian.org/tracker/CVE-2024-8034

https://security-tracker.debian.org/tracker/CVE-2024-8035

Plugin Details

Severity: High

ID: 206163

File Name: debian_DSA-5757.nasl

Version: 1.1

Type: local

Agent: unix

Published: 8/23/2024

Updated: 8/23/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-7974

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:chromium, p-cpe:/a:debian:debian_linux:chromium-common, p-cpe:/a:debian:debian_linux:chromium-driver, p-cpe:/a:debian:debian_linux:chromium-l10n, p-cpe:/a:debian:debian_linux:chromium-sandbox, p-cpe:/a:debian:debian_linux:chromium-shell, cpe:/o:debian:debian_linux:12.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 8/23/2024

Vulnerability Publication Date: 8/21/2024

Reference Information

CVE: CVE-2024-7964, CVE-2024-7965, CVE-2024-7966, CVE-2024-7967, CVE-2024-7968, CVE-2024-7969, CVE-2024-7971, CVE-2024-7972, CVE-2024-7973, CVE-2024-7974, CVE-2024-7975, CVE-2024-7976, CVE-2024-7977, CVE-2024-7978, CVE-2024-7979, CVE-2024-7980, CVE-2024-7981, CVE-2024-8033, CVE-2024-8034, CVE-2024-8035