Headline
Debian Security Advisory 5585-1
Debian Linux Security Advisory 5585-1 - An important security issue was discovered in Chromium, which could result in the execution of arbitrary code.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Debian Security Advisory DSA-5585-1 [email protected]
https://www.debian.org/security/ Andres Salomon
December 21, 2023 https://www.debian.org/security/faq
Package : chromium
CVE ID : CVE-2023-7024
An important security issue was discovered in Chromium, which could result
in the execution of arbitrary code.
Google is aware that an exploit for CVE-2023-7024 exists in the wild.
For the oldstable distribution (bullseye), this problem has been fixed
in version 120.0.6099.129-1~deb11u1.
For the stable distribution (bookworm), this problem has been fixed in
version 120.0.6099.129-1~deb12u1.
We recommend that you upgrade your chromium packages.
For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----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xniE
-----END PGP SIGNATURE-----
Related news
A coalition of dozens of countries, including France, the U.K., and the U.S., along with tech companies such as Google, MDSec, Meta, and Microsoft, have signed a joint agreement to curb the abuse of commercial spyware to commit human rights abuses. The initiative, dubbed the Pall Mall Process, aims to tackle the proliferation and irresponsible use of commercial cyber intrusion tools by
Hello everyone! It has been 3 months since the last episode. I spent most of this time improving my Vulristics project. So in this episode, let’s take a look at what’s been done. Alternative video link (for Russia): https://vk.com/video-149273431_456239139 Also, let’s take a look at the Microsoft Patch Tuesdays vulnerabilities, Linux Patch Wednesdays vulnerabilities and […]
Gentoo Linux Security Advisory 202401-34 - Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. Versions greater than or equal to 120.0.6099.109 are affected.
Microsoft has addressed a total of 48 security flaws spanning its software as part of its Patch Tuesday updates for January 2024. Of the 48 bugs, two are rated Critical and 46 are rated Important in severity. There is no evidence that any of the issues are publicly known or under active attack at the time of release, making it the second consecutive Patch Tuesday with no zero-days. The
By Waqas CISA Urges Swift Action as Two Critical Vulnerabilities Emerge. This is a post from HackRead.com Read the original post: CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library
Plus: Apple shuts down a Flipper Zero Attack, Microsoft patches more than 30 vulnerabilities, and more critical updates for the last month of 2023.
Google has issued an emergency update for Chrome that fixes an actively exploited zero-day vulnerability in the WebRTC component.
Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day flaw that it said has been exploited in the wild. The vulnerability, assigned the CVE identifier CVE-2023-7024, has been described as a heap-based buffer overflow bug in the WebRTC framework that could be exploited to result in program crashes or arbitrary code execution. Clément