Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5675-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5675-1 - Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
- systems | linux[9], debian[10]
- advisories | CVE-2024-4058[11], CVE-2024-4059[12], CVE-2024-4060[13]
- SHA-256 |
00ccb50fae5e1ffc0dedb975935d1c430bdb1c0605de3c11ff7187b895a8800f
- Download[14] | Favorite[15] | View[16]
Change Mirror[17] Download[18]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5675-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Andres Salomon
April 26, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium
CVE ID : CVE-2024-4058 CVE-2024-4059 CVE-2024-4060
Security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
For the stable distribution (bookworm), these problems have been fixed in
version 124.0.6367.78-1~deb12u1.
We recommend that you upgrade your chromium packages.
For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----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=8WgU
-----END PGP SIGNATURE-----
File Tags
- ActiveX[24] (933)
- Advisory[25] (84,962)
- Arbitrary[26] (16,674)
- BBS[27] (2,859)
- Bypass[28] (1,833)
- CGI[29] (1,032)
- Code Execution[30] (7,639)
- Conference[31] (689)
- Cracker[32] (844)
- CSRF[33] (3,373)
- DoS[34] (24,619)
- Encryption[35] (2,383)
- Exploit[36] (52,851)
- File Inclusion[37] (4,253)
- File Upload[38] (987)
- Firewall[39] (822)
- Info Disclosure[40] (2,854)
- Intrusion Detection[41] (907)
- Java[42] (3,128)
- JavaScript[43] (890)
- Kernel[44] (7,030)
- Local[45] (14,717)
- Magazine[46] (586)
- Overflow[47] (13,065)
- Perl[48] (1,430)
- PHP[49] (5,200)
- Proof of Concept[50] (2,368)
- Protocol[51] (3,703)
- Python[52] (1,602)
- Remote[53] (31,445)
- Root[54] (3,618)
- Rootkit[55] (523)
- Ruby[56] (619)
- Scanner[57] (1,650)
- Security Tool[58] (7,983)
- Shell[59] (3,258)
- Shellcode[60] (1,217)
- Sniffer[61] (900)
- Spoof[62] (2,261)
- SQL Injection[63] (16,540)
- TCP[64] (2,425)
- Trojan[65] (689)
- UDP[66] (899)
- Virus[67] (669)
- Vulnerability[68] (32,631)
- Web[69] (9,884)
- Whitepaper[70] (3,775)
- x86[71] (967)
- XSS[72] (18,181)
- Other[73]
File Archives
- April 2024[74]
- March 2024[75]
- February 2024[76]
- January 2024[77]
- December 2023[78]
- November 2023[79]
- October 2023[80]
- September 2023[81]
- August 2023[82]
- July 2023[83]
- June 2023[84]
- May 2023[85]
- Older[86]
Systems
- AIX[87] (429)
- Apple[88] (2,078)
- BSD[89] (376)
- CentOS[90] (58)
- Cisco[91] (1,927)
- Debian[92] (7,024)
- Fedora[93] (1,693)
- FreeBSD[94] (1,246)
- Gentoo[95] (4,467)
- HPUX[96] (880)
- iOS[97] (373)
- iPhone[98] (108)
- IRIX[99] (220)
- Juniper[100] (69)
- Linux[101] (49,363)
- Mac OS X[102] (691)
- Mandriva[103] (3,105)
- NetBSD[104] (256)
- OpenBSD[105] (488)
- RedHat[106] (15,594)
- Slackware[107] (941)
- Solaris[108] (1,611)
- SUSE[109] (1,444)
- Ubuntu[110] (9,472)
- UNIX[111] (9,394)
- UnixWare[112] (187)
- Windows[113] (6,650)
- Other[114]
- Services
- Security Services[125]
- Hosting By
- Rokasec[126]
Read more https://packetstormsecurity.com/files/178304/dsa-5675-1.txt