{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2014-3174","title":"Title"},{"category":"description","text":"modules/webaudio/BiquadDSPKernel.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 37.0.2062.94, does not properly consider concurrent threads during attempts to update biquad filter coefficients, which allows remote attackers to cause a denial of service (read of uninitialized memory) via crafted API calls.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2014-3174","url":"https://www.suse.com/security/cve/CVE-2014-3174"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 893720 for CVE-2014-3174","url":"https://bugzilla.suse.com/893720"},{"category":"external","summary":"Advisory link for openSUSE-SU-2014:1151-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4J5I5ZCNYEF2NQH7V7IWVAGCS2JGESPK/#4J5I5ZCNYEF2NQH7V7IWVAGCS2JGESPK"}],"title":"SUSE CVE CVE-2014-3174","tracking":{"current_release_date":"2025-03-16T12:17:12Z","generator":{"date":"2023-02-15T05:29:16Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2014-3174","initial_release_date":"2023-02-15T05:29:16Z","revision_history":[{"date":"2023-02-15T05:29:16Z","number":"2","summary":"Current version"},{"date":"2023-12-08T04:51:12Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:22:46Z","number":"4","summary":"Current version"},{"date":"2025-03-16T12:17:12Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Leap 15.0","product":{"name":"openSUSE Leap 15.0","product_id":"openSUSE Leap 15.0","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.0"}}},{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"chromedriver-55.0.2883.75-3.1","product":{"name":"chromedriver-55.0.2883.75-3.1","product_id":"chromedriver-55.0.2883.75-3.1","product_identification_helper":{"purl":"pkg:rpm/suse/chromedriver@55.0.2883.75-3.1"}}},{"category":"product_version","name":"chromium-55.0.2883.75-3.1","product":{"name":"chromium-55.0.2883.75-3.1","product_id":"chromium-55.0.2883.75-3.1","product_identification_helper":{"cpe":"cpe:2.3:a:chromium:chromium:55.0.2883.75:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/chromium@55.0.2883.75-3.1"}}},{"category":"product_version","name":"chromium-66.0.3359.170-lp150.1.1","product":{"name":"chromium-66.0.3359.170-lp150.1.1","product_id":"chromium-66.0.3359.170-lp150.1.1","product_identification_helper":{"cpe":"cpe:2.3:a:chromium:chromium:66.0.3359.170:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/chromium@66.0.3359.170-lp150.1.1"}}},{"category":"product_version","name":"ungoogled-chromium-113.0.5672.92-1.1","product":{"name":"ungoogled-chromium-113.0.5672.92-1.1","product_id":"ungoogled-chromium-113.0.5672.92-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/ungoogled-chromium@113.0.5672.92-1.1"}}},{"category":"product_version","name":"ungoogled-chromium-chromedriver-113.0.5672.92-1.1","product":{"name":"ungoogled-chromium-chromedriver-113.0.5672.92-1.1","product_id":"ungoogled-chromium-chromedriver-113.0.5672.92-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/ungoogled-chromium-chromedriver@113.0.5672.92-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"chromium-66.0.3359.170-lp150.1.1 as component of openSUSE Leap 15.0","product_id":"openSUSE Leap 15.0:chromium-66.0.3359.170-lp150.1.1"},"product_reference":"chromium-66.0.3359.170-lp150.1.1","relates_to_product_reference":"openSUSE Leap 15.0"},{"category":"default_component_of","full_product_name":{"name":"chromedriver-55.0.2883.75-3.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:chromedriver-55.0.2883.75-3.1"},"product_reference":"chromedriver-55.0.2883.75-3.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"chromium-55.0.2883.75-3.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:chromium-55.0.2883.75-3.1"},"product_reference":"chromium-55.0.2883.75-3.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ungoogled-chromium-113.0.5672.92-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1"},"product_reference":"ungoogled-chromium-113.0.5672.92-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ungoogled-chromium-chromedriver-113.0.5672.92-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1"},"product_reference":"ungoogled-chromium-chromedriver-113.0.5672.92-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2014-3174","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-3174"}],"notes":[{"category":"general","text":"modules/webaudio/BiquadDSPKernel.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 37.0.2062.94, does not properly consider concurrent threads during attempts to update biquad filter coefficients, which allows remote attackers to cause a denial of service (read of uninitialized memory) via crafted API calls.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.0:chromium-66.0.3359.170-lp150.1.1","openSUSE Tumbleweed:chromedriver-55.0.2883.75-3.1","openSUSE Tumbleweed:chromium-55.0.2883.75-3.1","openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1","openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1"]},"references":[{"category":"external","summary":"CVE-2014-3174","url":"https://www.suse.com/security/cve/CVE-2014-3174"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 893720 for CVE-2014-3174","url":"https://bugzilla.suse.com/893720"},{"category":"external","summary":"Advisory link for openSUSE-SU-2014:1151-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4J5I5ZCNYEF2NQH7V7IWVAGCS2JGESPK/#4J5I5ZCNYEF2NQH7V7IWVAGCS2JGESPK"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.0:chromium-66.0.3359.170-lp150.1.1","openSUSE Tumbleweed:chromedriver-55.0.2883.75-3.1","openSUSE Tumbleweed:chromium-55.0.2883.75-3.1","openSUSE Tumbleweed:ungoogled-chromium-113.0.5672.92-1.1","openSUSE Tumbleweed:ungoogled-chromium-chromedriver-113.0.5672.92-1.1"]}],"threats":[{"category":"impact","date":"2014-08-27T06:16:11Z","details":"moderate"}],"title":"CVE-2014-3174"}]}