External check
CVE-2008-3655: missing from list CVE-2020-25658: RESERVED -- The output might be a bit terse, but the above ids are known elsewhere, check the references in the tracker. The second part indicates the status of that id in the tracker at the moment the script was run.
Re: Is chromium updated?
https://www.theregister.com/2020/11/04/google_chrome_critical_updates/ Wed 4 Nov 2020 If you're an update laggard, buck up: Chrome zero-days are being exploited in the wild Desktop and Android versions both at risk On Sat, Oct 17, 2020 at 9:31 PM wrote: > > Hi, > > 17 oct. 2020 à 14:28 de ggunin...@gmail.com: > > > On Debian stable, I have chromium Version: 83.0.4103.116-1~deb10u3 > > > > >From Arch advisory on 2020-10-10: > > The package chromium before version 86.0.4240.75-1 is vulnerable to > > multiple issues including arbitrary code execution, access restriction > > bypass, information disclosure and insufficient validation. > > https://lists.archlinux.org/pipermail/arch-security/2020-October/001608.html > > > > Is Debian's chromium vulnerable now? > > > I would say yes for the time being indeed: > https://security-tracker.debian.org/tracker/source-package/chromium > See "vulnerable" in 2nd column for CVE-2020-15967 to CVE-2020-15992 + > CVE-2020-6557 > > Best regards, > l0f4r0 >
[SECURITY] [DSA 4786-1] libexif security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4786-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 08, 2020 https://www.debian.org/security/faq - - Package: libexif CVE ID : CVE-2020-0452 It was discovered that a boundary check in libexif, a library to parse EXIF files, could be optimised away by the compiler, resulting in a potential buffer overflow. For the stable distribution (buster), this problem has been fixed in version 0.6.21-5.1+deb10u5. We recommend that you upgrade your libexif packages. For the detailed security status of libexif please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libexif Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl+oCFAACgkQEMKTtsN8 TjawTBAAvQ/VB+0Nlbd9plOAUFtse3jrtgALiAczERsAntbBUOQweblDS/xK21Ng qlMaNpPspmMcbsLu+3kwKs8rO2sG5i50DkfyXYwshVENLLgG7jbvJ/LH1XLLKzPe yazeKybNaH7zqiONr3q+45av8+dPeLjsjJjY9Up8wKM9Fkyh6VZqkgd14ixzTP4A /qPl9cU1oz+XrAz9kml85Xbq61IiM+7fRJv2yUimYkWxPGHJf2xPp0o55KPPz6x9 Yl4EwAjU7AsAhc+BEKAx8xIFsEYdtq3Ym3EXd5UTQSIi9K2WqM+TbuLKFeWkysdF YRz2yifQhIg4NRMMMKXP5JV/P6Kma91LvqHbU1ZN70V0Ts9SClZAvQene9npCuFa fc98/KcilRofhpdKfPFMwf5LaNrytJcC9ue8enM+Xj/iLDM2S6AwNzEZAKv/liYP hdAVbK9QETcobUe0jrLEubbmUqezMEl1s6GgqljqJOVkz1LHZZK/YvSUnhsXxkqA MTqKuM7mJVbJsDEvgFa3BdGJuH1E4ya6x+TwJFw4DmJ+acXHZ+0k4/iuZwK/QloN x26jdr25WjwRqp/vmTcxTYp5Sxl2zv3BRLh+EJasBbB58pIxYPAQzLnEIA8KmiGJ SyNR3qoSPcN5kchT+IkS673zPFRGosyOYaDxKn2Z4a2bGnoMuVo= =Yb9P -END PGP SIGNATURE-