-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.6305
                         chromium security update
                              5 December 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-4195 CVE-2022-4194 CVE-2022-4193
                   CVE-2022-4192 CVE-2022-4191 CVE-2022-4190
                   CVE-2022-4189 CVE-2022-4188 CVE-2022-4187
                   CVE-2022-4186 CVE-2022-4185 CVE-2022-4184
                   CVE-2022-4183 CVE-2022-4182 CVE-2022-4181
                   CVE-2022-4180 CVE-2022-4179 CVE-2022-4178
                   CVE-2022-4177 CVE-2022-4176 CVE-2022-4175
                   CVE-2022-4174  

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2022/msg00264.html

Comment: CVSS (Max):  8.8 CVE-2022-4194 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5293-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 03, 2022                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : chromium
CVE ID         : CVE-2022-4174 CVE-2022-4175 CVE-2022-4176 CVE-2022-4177 
                 CVE-2022-4178 CVE-2022-4179 CVE-2022-4180 CVE-2022-4181 
                 CVE-2022-4182 CVE-2022-4183 CVE-2022-4184 CVE-2022-4185 
                 CVE-2022-4186 CVE-2022-4187 CVE-2022-4188 CVE-2022-4189 
                 CVE-2022-4190 CVE-2022-4191 CVE-2022-4192 CVE-2022-4193 
                 CVE-2022-4194 CVE-2022-4195

Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.

For the stable distribution (bullseye), these problems have been fixed in
version 108.0.5359.71-2~deb11u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=jTzc
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=w9rC
-----END PGP SIGNATURE-----