[SECURITY] [DSA 5875-1] chromium security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5875-1 [email protected]
https://www.debian.org/security/ Andres Salomon
March 06, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium
CVE ID : CVE-2025-1914 CVE-2025-1915 CVE-2025-1916 CVE-2025-1917
CVE-2025-1918 CVE-2025-1919 CVE-2025-1921 CVE-2025-1922
CVE-2025-1923
Security issues were discovered in Chromium which could result
in the execution of arbitrary code, denial of service, or information
disclosure.
For the stable distribution (bookworm), these problems have been fixed in
version 134.0.6998.35-1~deb12u1.
We recommend that you upgrade your chromium packages.
For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----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=MMBe
-----END PGP SIGNATURE-----
Reply to: