-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5768-1                   secur...@debian.org
https://www.debian.org/security/                           Andres Salomon
September 11, 2024                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium
CVE ID         : CVE-2024-8636 CVE-2024-8637 CVE-2024-8638 CVE-2024-8639

Security issues were discovered in Chromium which could result
in the execution of arbitrary code, denial of service, or information
disclosure.

For the stable distribution (bookworm), these problems have been fixed in
version 128.0.6613.137-1~deb12u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=AWwj
-----END PGP SIGNATURE-----

Reply via email to