-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.4848
                         chromium security update
                             29 September 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-3318 CVE-2022-3317 CVE-2022-3316
                   CVE-2022-3315 CVE-2022-3314 CVE-2022-3313
                   CVE-2022-3312 CVE-2022-3311 CVE-2022-3310
                   CVE-2022-3309 CVE-2022-3308 CVE-2022-3307
                   CVE-2022-3306 CVE-2022-3305 CVE-2022-3304
                   CVE-2022-3201  

Original Bulletin: 
   https://www.debian.org/security/2022/dsa-5224

Comment: CVSS (Max):  7.8 CVE-2022-38784 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5244-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 28, 2022                    https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : chromium
CVE ID         : CVE-2022-3201 CVE-2022-3304 CVE-2022-3305 CVE-2022-3306 
                 CVE-2022-3307 CVE-2022-3308 CVE-2022-3309 CVE-2022-3310 
                 CVE-2022-3311 CVE-2022-3312 CVE-2022-3313 CVE-2022-3314 
                 CVE-2022-3315 CVE-2022-3316 CVE-2022-3317 CVE-2022-3318

Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.

For the stable distribution (bullseye), these problems have been fixed in
version 106.0.5249.61-1~deb11u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=rNFw
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=w2Kv
-----END PGP SIGNATURE-----