Headline
Debian Security Advisory 5428-1
Debian Linux Security Advisory 5428-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5428-1 [email protected]://www.debian.org/security/ Moritz MuehlenhoffJune 15, 2023 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : chromiumCVE ID : CVE-2023-3214 CVE-2023-3215 CVE-2023-3216 CVE-2023-3217Multiple security issues were discovered in Chromium, which could resultin the execution of arbitrary code, denial of service or informationdisclosure.For the oldstable distribution (bullseye), these problems have been fixedin version 114.0.5735.133-1~deb11u1.For the stable distribution (bookworm), these problems have been fixed inversion 114.0.5735.133-1~deb12u1.We recommend that you upgrade your chromium packages.For the detailed security status of chromium please refer toits security tracker page at:https://security-tracker.debian.org/tracker/chromiumFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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Y/wM-----END PGP SIGNATURE-----
Related news
Gentoo Linux Security Advisory 202401-34 - Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. Versions greater than or equal to 120.0.6099.109 are affected.
Gentoo Linux Security Advisory 202311-11 - Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution. Versions greater than or equal to 5.15.10_p20230623 are affected.
Categories: Exploits and vulnerabilities Categories: News Tags: Google Tags: Chrome Tags: Autofill Tags: payments critical Tags: CVE-2023-3214 Google has released an update which includes five security fixes including a critical vulnerability in Autofill payments. (Read more...) The post Update Chrome now! Google fixes critical vulnerability in Autofill payments appeared first on Malwarebytes Labs.
Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)