Headline
Debian Security Advisory 5345-1
Debian Linux Security Advisory 5345-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5345-1 [email protected]://www.debian.org/security/ Moritz MuehlenhoffFebruary 08, 2023 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : chromiumCVE ID : CVE-2023-0696 CVE-2023-0697 CVE-2023-0698 CVE-2023-0699 CVE-2023-0700 CVE-2023-0701 CVE-2023-0702 CVE-2023-0703 CVE-2023-0704 CVE-2023-0705Debian Bug : 1030160Multiple security issues were discovered in Chromium, which could resultin the execution of arbitrary code, denial of service or informationdisclosure.For the stable distribution (bullseye), these problems have been fixed inversion 110.0.5481.77-1~deb11u1.We recommend that you upgrade your chromium packages.For the detailed security status of chromium please refer toits security tracker page at:https://security-tracker.debian.org/tracker/chromiumFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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Lc/Z-----END PGP SIGNATURE-----
Related news
Gentoo Linux Security Advisory 202309-17 - Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. Versions greater than or equal to 113.0.5672.126 are affected.
Hello everyone! This episode and will be about latest news in my Vulristics project. EPSS v3 The third iteration of the Exploit Prediction Scoring System (EPSS) was released in March. It is stated that EPSS has become 82% better. There is a pretty cool and detailed article about the changes. For example, EPSS Team began to analyze not 16 parameters […]
Plus: Microsoft fixes several zero-day bugs, Google patches Chrome and Android, Mozilla rids Firefox of a full-screen vulnerability, and more.
Ubuntu Security Notice 5881-1 - It was discovered that Chromium did not properly manage memory. A remote attacker could possibly use these issues to cause a denial of service or execute arbitrary code via a crafted HTML page. It was discovered that Chromium did not properly manage memory. A remote attacker who convinced a user to install a malicious extension could possibly use this issue to corrupt memory via a Chrome web app.
Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)