[SECURITY] [DSA 5515-1] chromium security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5515-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
October 04, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium
CVE ID : CVE-2023-5346
A security issue was discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
For the oldstable distribution (bullseye), this problem has been fixed
in version 117.0.5938.149-1~deb11u1.
For the stable distribution (bookworm), this problem has been fixed in
version 117.0.5938.149-1~deb12u1.
We recommend that you upgrade your chromium packages.
For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----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=iaPP
-----END PGP SIGNATURE-----
Reply to: