exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5676-1

Debian Security Advisory 5676-1
Posted May 2, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5676-1 - Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

tags | advisory, denial of service, arbitrary, info disclosure
systems | linux, debian
advisories | CVE-2024-4331, CVE-2024-4368
SHA-256 | c8a90b6292a6c4c3420fce49648c7bda2ab98985db0fced3a1043d2b9fa2b7c6

Debian Security Advisory 5676-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5676-1 security@debian.org
https://www.debian.org/security/ Andres Salomon
May 02, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : chromium
CVE ID : CVE-2024-4331 CVE-2024-4368

Security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.

For the stable distribution (bookworm), these problems have been fixed in
version 124.0.6367.118-1~deb12u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=pyNF
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close