Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5598-1

Debian Linux Security Advisory 5598-1 - A security issue was discovered in Chromium, which could result in the execution of arbitrary code, denial of service, or information disclosure.

Packet Storm
#linux#debian#dos#js#c++#chrome
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256- -------------------------------------------------------------------------Debian Security Advisory DSA-5598-1                   [email protected]://www.debian.org/security/                           Andres SalomonJanuary 10, 2024                      https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : chromiumCVE ID         : CVE-2024-0333A security issue was discovered in Chromium, which could resultin the execution of arbitrary code, denial of service, or informationdisclosure.For the oldstable distribution (bullseye), this problem has been fixedin version 120.0.6099.216-1~deb11u1. Note that chromium security supportfor the oldstable distribution is ending, and this is likely to be thelast release for it.For the stable distribution (bookworm), this problem has been fixed inversion 120.0.6099.216-1~deb12u1.We recommend that you upgrade your chromium packages.For the detailed security status of chromium please refer toits security tracker page at:https://security-tracker.debian.org/tracker/chromiumFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----iQIzBAEBCAAdFiEEUAUk+X1YiTIjs19qZF0CR8NudjcFAmWe960ACgkQZF0CR8Nudjcx9Q//WvdPeou8hwSfeR7U6+5+WRW907xxrPCGebZi0d2LW0V3HYB0uIRAxPXjffZz0f3bgbEk81GDgNWXh91xaP7jmwJqvUT/vB4yhUZmEOBmn+svqUgLi973tab1naj91M01C04iQyqlbzjOQXiEFc6MFh9FDbUbmFX1lYByzQHOLcMD3VyPtdnBAJY9o+/6Aoz51bDaJbbV1I231aafG1wfcz5CSuNKpzDGzqeOyI4D0tChSfJN4NnjeQtNWnIzUP9ouQhcxkLAk5ToQmh7Xh/HT9bfgGeTiF283/Pz/ky2uM1A6J5x+Kt1OocwCinaXR0wLYl7LmhNcp/y2Nj+5XsjI2cutTAUfMQ75lsxoFgIzaoeoY1KgdiEbRZa3i6RzB7Nng7bFkp6Dn8PJDicr4+NGCcOIvYHDSu5lqj0vlE5b/LX1ghNzmYYmB/1FsafxYBAOctPwhW9DPNZJMRptWKoF1k3hn7J8PaMMLHgHHwsZdvDcSNoA5t9VL8/fLmC6U2fKsPliscUFTrmQiUNYorDn7KOJsdzMnxld02+YACYEvQg6wQXCB/Yhur9mRm7wK0CXnPKi8qdqDUgmmVXjJATEkEAnqENKvy15MCGgt1JZnDQd2eqRU4B4/Ui1Yic5sBt2Mfbwo1jxPj3aaCE/bW0ykqvXpN0/GyJsYeylKBC8XI==wTxO-----END PGP SIGNATURE-----

Related news

Gentoo Linux Security Advisory 202402-23

Gentoo Linux Security Advisory 202402-23 - Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. Versions greater than or equal to 121.0.6167.139 are affected.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution