Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5275-1

Debian Linux Security Advisory 5275-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

Packet Storm
#linux#debian#dos#js#chrome
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5275-1                   [email protected]://www.debian.org/security/                       Moritz MuehlenhoffNovember 10, 2022                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : chromiumCVE ID         : CVE-2022-3885 CVE-2022-3886 CVE-2022-3887 CVE-2022-3888                  CVE-2022-3889 CVE-2022-3890Debian Bug     : 1015931Multiple security issues were discovered in Chromium, which could resultin the execution of arbitrary code, denial of service or informationdisclosure.For the stable distribution (bullseye), these problems have been fixed inversion 107.0.5304.110-1~deb11u1.We recommend that you upgrade your chromium packages.For the detailed security status of chromium please refer toits security tracker page at:https://security-tracker.debian.org/tracker/chromiumFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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EgjK-----END PGP SIGNATURE-----

Related news

CVE-2023-22436: en/security-disclosure/2023/2023-02.md · OpenHarmony/security - Gitee.com

The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.

CVE-2022-3890: Stable Channel Update for Desktop

Heap buffer overflow in Crashpad in Google Chrome on Android prior to 107.0.5304.106 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chrome security severity: High)

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution