Debian DSA-2959-1 : chromium-browser - security update

high Nessus Plugin ID 76057

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the chromium web browser.

- CVE-2014-3154 Collin Payne discovered a use-after-free issue in the filesystem API.

- CVE-2014-3155 James March, Daniel Sommermann, and Alan Frindell discovered several out-of-bounds read issues in the SPDY protocol implementation.

- CVE-2014-3156 Atte Kettunen discovered a buffer overflow issue in bitmap handling in the clipboard implementation.

- CVE-2014-3157 A heap-based buffer overflow issue was discovered in chromium's ffmpeg media filter.

In addition, this version corrects a regression in the previous update. Support for older i386 processors had been dropped. This functionality is now restored.

Solution

Upgrade the chromium-browser packages.

For the stable distribution (wheezy), these problems have been fixed in version 35.0.1916.153-1~deb7u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2014-3154

https://security-tracker.debian.org/tracker/CVE-2014-3155

https://security-tracker.debian.org/tracker/CVE-2014-3156

https://security-tracker.debian.org/tracker/CVE-2014-3157

https://packages.debian.org/source/wheezy/chromium-browser

https://www.debian.org/security/2014/dsa-2959

Plugin Details

Severity: High

ID: 76057

File Name: debian_DSA-2959.nasl

Version: 1.9

Type: local

Agent: unix

Published: 6/16/2014

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:chromium-browser, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 6/14/2014

Reference Information

CVE: CVE-2014-3154, CVE-2014-3155, CVE-2014-3156, CVE-2014-3157

BID: 67972, 67977, 67980, 67981

DSA: 2959