Lucene search

K
debianDebianDEBIAN:DSA-5054-1:6F130
HistoryJan 23, 2022 - 4:33 p.m.

[SECURITY] [DSA 5054-1] chromium security update

2022-01-2316:33:08
lists.debian.org
21
chromium
security update
cve-2022-0289
cve-2022-0290
cve-2022-0291
bullseye
debian
information disclosure

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.4

Confidence

High

EPSS

0.012

Percentile

85.5%


Debian Security Advisory DSA-5054-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
January 23, 2022 https://www.debian.org/security/faq


Package : chromium
CVE ID : CVE-2022-0289 CVE-2022-0290 CVE-2022-0291 CVE-2022-0292
CVE-2022-0293 CVE-2022-0294 CVE-2022-0295 CVE-2022-0296
CVE-2022-0297 CVE-2022-0298 CVE-2022-0300 CVE-2022-0301
CVE-2022-0302 CVE-2022-0303 CVE-2022-0304 CVE-2022-0305
CVE-2022-0306 CVE-2022-0307 CVE-2022-0308 CVE-2022-0309
CVE-2022-0310 CVE-2022-0311

Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.

For the stable distribution (bullseye), this problem has been fixed in
version 97.0.4692.99-1~deb11u2.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.4

Confidence

High

EPSS

0.012

Percentile

85.5%