[SECURITY] [DSA 5629-1] chromium security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian Security Advisory DSA-5629-1 secur...@debian.org https://www.debian.org/security/ Andres Salomon February 23, 2024 https://www.debian.org/security/faq - - Package: chromium CVE ID : CVE-2024-1669 CVE-2024-1670 CVE-2024-1671 CVE-2024-1672 CVE-2024-1673 CVE-2024-1674 CVE-2024-1675 CVE-2024-1676 Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. For the stable distribution (bookworm), these problems have been fixed in version 122.0.6261.57-1~deb12u1. We recommend that you upgrade your chromium packages. For the detailed security status of chromium please refer to its security tracker page at: https://security-tracker.debian.org/tracker/chromium Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEUAUk+X1YiTIjs19qZF0CR8NudjcFAmXYNoEACgkQZF0CR8Nu djcqXA//bWGEiwv3xiYCsDresz86tTt51gyCKz7ZKSKHC2t2McxigIZKroa+I0X2 gCGVAMUXCUS8ws06l0MENOXAzSzs141geA+G+HZ0rLQsO0F8PyMNYYrLR+Dglc+j 6+oOHhLyU9UmYi7M46NfzrmYde3D/EnNrKQr1LlYLSkjokeNnzkmS6WQekJUtnh+ O7v0GQzgSNSxka5Pj/NwUbB0anRY3vYw4RGDuZS0RaWz6njbexBiYf+shHfm8c0Z ppV788VJhhD1bI+G5jc6Y46Xc50J2CcU+EnaxfTcRQluGXMOgnpgUG74Vr6YfCp+ 5KYw6aOqCRLHVY5p+f4xiw20DpvzSRbFuDpy8o4pgd0lwwhfa7C/LmA9jnm6kzvM th/Ra0lLbSVax4COTxdqCxLMwgVVa/6IWXaW0Cp0SdouB5hstogayKuDizqwAd6+ 72ArNkAdUCxLNVlgUqjK2S2cVzfHPJQ0Mn3nAXV/9MZAqATYI1DY2ZdWYOsupAN2 E/CST/uIOGBYStjERed3DinaC2EVA2QdZZPwQpOpZYuIiG9b4qQ7BXgEMjjZPvhU lmeTyYnNJp3+BfHEXgTCLrsCIitp57wD7BqIOyL2YY5wNE8VWk5Kk7ZCYbs3YV70 RyHovB+BDAc/i5aYOrsGJ1mI5bLDMFZ0GT3gKin+BkzqfyC+7EU= =b0l1 -END PGP SIGNATURE-
[SECURITY] [DSA 5628-1] imagemagick security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5628-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff February 22, 2024 https://www.debian.org/security/faq - - Package: imagemagick CVE ID : CVE-2021-3610 CVE-2022-1115 CVE-2023-1289 CVE-2023-1906 CVE-2023-3428 CVE-2023-5341 CVE-2023-34151 Debian Bug : 1013282 1036999 This update fixes multiple vulnerabilities in Imagemagick: Various memory handling problems and cases of missing or incomplete input sanitising may result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed image files are processed. For the oldstable distribution (bullseye), these problems have been fixed in version 8:6.9.11.60+dfsg-1.3+deb11u3. For the stable distribution (bookworm), these problems have been fixed in version 8:6.9.11.60+dfsg-1.6+deb12u1. We recommend that you upgrade your imagemagick packages. For the detailed security status of imagemagick please refer to its security tracker page at: https://security-tracker.debian.org/tracker/imagemagick Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmXXmJoACgkQEMKTtsN8 TjZ4oA//dcUTeog3Pl7y1vg7o0IRWkWMbHtamfOavzrUPt+r9LFc1B0HAxUhrtet r7svk5r2WlQjMjcANg19F1hVqGAx+WVKFz15ydmzugU7TWoudZdSyE0gcAQfW4mg UeiU+MnhcOyIfJJuV+EQD3JvsfLmRzMGG5WzDTkTbe+y78paXrskMY/y5vhSPlnR +3wyqdZ0R1urzoVpShj1fullrmTTUnTr3/kxTXm5S1LBjcMwpdMoRTFJBuOXlPSa jA+dDkpeer/UiBIH0piaUmxByG2BtzDGjvvi6BlohqvpERFrqfsb59+Scimi3arr vYHELehJTqM+jUvg3VehSGTFId6qsGVsM0eKUFtFMdlL016U34LICfP+FDlP1DJ0 VKyab9UDyU6Zf7aWiVnJt6GQdicIQ64hsvVBuj3u90WcI63qR6RybuxmGhBfIJs+ VkG23qv8DjrvRpFesUaTvbOfMOJ3q0OvXIF9TMx5CNimPuEc8esg2Ktzdoaiy7Vj gmNewYaGRqrLDLsK48pJx4qLz4WfvRLVZPWnKuyUaQaRsybsSdFx+r8id/utJ6sW 6I8H9KouHflKPZhzccnMGHZJFD1H/DzQHAbCvUz8yKaA+OMU5RgcsGWawmRhavDW fXzfUyMSJYV57voszyQmrBMOSzQHi/f0SIBqFtK928ATLXHY/bs= =KFsb -END PGP SIGNATURE-