Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5551-1

Debian Linux Security Advisory 5551-1 - Debian appears to have forgotten to put the actual details of the advisory in this advisory, but they recommend that you upgrade your chromium packages.

Packet Storm
#linux#debian#js#chrome#sap
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256- -------------------------------------------------------------------------Debian Security Advisory DSA-5551-1                   [email protected]://www.debian.org/security/                           Andres SalomonNovember 09, 2023                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : chromiumCVE ID         : CVE-2023-5996Debian Bug     : 1033136DSA text goes hereFor the oldstable distribution (bullseye), this problem has been fixedin version 119.0.6045.123-1~deb11u1.For the stable distribution (bookworm), this problem has been fixed inversion 119.0.6045.123-1~deb12u1.We recommend that you upgrade your chromium packages.For the detailed security status of chromium please refer toits security tracker page at:https://security-tracker.debian.org/tracker/chromiumFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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s8+l-----END PGP SIGNATURE-----

Related news

Gentoo Linux Security Advisory 202401-34

Gentoo Linux Security Advisory 202401-34 - Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. Versions greater than or equal to 120.0.6099.109 are affected.

Gentoo Linux Security Advisory 202312-07

Gentoo Linux Security Advisory 202312-7 - Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution. Versions greater than or equal to 5.15.11_p20231120 are affected.

Gentoo Linux Security Advisory 202311-11

Gentoo Linux Security Advisory 202311-11 - Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution. Versions greater than or equal to 5.15.10_p20230623 are affected.

CVE-2023-5996: Stable Channel Update for Desktop

Use after free in WebAudio in Google Chrome prior to 119.0.6045.123 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution