Headline
Debian Security Advisory 5687-1
Debian Linux Security Advisory 5687-1 - A security issue was discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. Google is aware that an exploit for CVE-2024-4671 exists in the wild.
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256- -------------------------------------------------------------------------Debian Security Advisory DSA-5687-1 [email protected]://www.debian.org/security/ Andres SalomonMay 10, 2024 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : chromiumCVE ID : CVE-2024-4671A security issue was discovered in Chromium, which could resultin the execution of arbitrary code, denial of service or informationdisclosure. Google is aware that an exploit for CVE-2024-4671 existsin the wild.For the stable distribution (bookworm), this problem has been fixed inversion 124.0.6367.201-1~deb12u1.We highly recommend that you upgrade your chromium packages.For the detailed security status of chromium please refer toits security tracker page at:https://security-tracker.debian.org/tracker/chromiumFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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/LcI-----END PGP SIGNATURE-----
Related news
Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google Chrome browsers to infect mobile users with information-stealing malware. "These campaigns delivered n-day exploits for which patches were available, but would still be effective against unpatched devices," Google Threat Analysis Group (TAG) researcher Clement
Google has revealed that a security flaw that was patched as part of a security update rolled out last week to its Chrome browser has come under active exploitation in the wild. Tracked as CVE-2024-7965, the vulnerability has been described as an inappropriate implementation bug in the V8 JavaScript and WebAssembly engine. "Inappropriate implementation in V8 in Google Chrome prior to
Google has rolled out security fixes to address a high-severity security flaw in its Chrome browser that it said has come under active exploitation in the wild. Tracked as CVE-2024-7971, the vulnerability has been described as a type confusion bug in the V8 JavaScript and WebAssembly engine. "Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap
Google has released security patches for two vulnerabilities. Make sure you're using the latest version.