SB2015052011 - Input validation error in Debian Linux
Published: May 20, 2015 Updated: August 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2015-1258)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.
Remediation
Install update from vendor's website.
References
- http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168803.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166975.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html
- http://www.debian.org/security/2015/dsa-3267
- http://www.securityfocus.com/bid/74723
- http://www.securitytracker.com/id/1032375
- https://code.google.com/p/chromium/issues/detail?id=450939
- https://codereview.chromium.org/1106303002
- https://security.gentoo.org/glsa/201506-04