Debian dsa-6273:chromium - 安全性更新

critical Nessus Plugin ID 314979

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 12/13 主機上安裝的多個套件受到 dsa-6273 公告中提及的多個弱點影響。

- ------------------------------------------------------------------------- Debian 安全公告 DSA-6273-1 [email protected] https://www.debian.org/security/Andres Salomon 2026 年 5 月 15 日https://www.debian.org/security/faq
- -------------------------------------------------------------------------

套件:chromium CVE ID:CVE-2026-8509 CVE-2026-8510 CVE-2026-8511 CVE-2026-8512 CVE-2026-8513 CVE-2026-8514 CVE-2026-8515 CVE-2026-8516 CVE-2026-8517 CVE-2026-8518 CVE-2026-8519 CVE-2026-8520 CVE-2026-8521 CVE-2026-8522 CVE-2026-8523 CVE-2026-8524 CVE-2026-8525 CVE-2026-8526 CVE-2026-8527 CVE-2026-8528 CVE-2026-8529 CVE-2026-8530 CVE-2026-8531 CVE-2026-8532 CVE-2026-8533 CVE-2026-8534 CVE-2026-8535 CVE-2026-8536 CVE-2026-8537 CVE-2026-8538 CVE-2026-8539 CVE-2026-8540 CVE-2026-8541 CVE-2026-8542 CVE-2026-8543 CVE-2026-8544 CVE-2026-8545 CVE-2026-8546 CVE-2026-8547 CVE-2026-8548 CVE-2026-8549 CVE-2026-8550 CVE-2026-8551 CVE-2026-8552 CVE-2026-8553 CVE-2026-8554 CVE-2026-8555 CVE-2026-8556 CVE-2026-8557 CVE-2026-8558 CVE-2026-8559 CVE-2026-8560 CVE-2026-8561 CVE-2026-8562 CVE-2026-8563 CVE-2026-8564 CVE-2026-8565 CVE-2026-8566 CVE-2026-8567 CVE-2026-8568 CVE-2026-8569 CVE-2026-8570 CVE-2026-8571 CVE-2026-8572 CVE-2026-8573 CVE-2026-8574 CVE-2026-8575 CVE-2026-8576 CVE-2026-8577 CVE-2026-8578 CVE-2026-8579 CVE-2026-8580 CVE-2026-8581 CVE-2026-8582 CVE-2026-8583 CVE-2026-8584 CVE-2026-8585 CVE-2026-8586 CVE-2026-8587

據發現,Chromium 中存在安全性問題,這些問題可導致任意程式碼執行、拒絕服務或資訊洩漏攻擊。

針對舊的穩定發行版本 (bookworm),已在 148.0.7778.167-1~deb12u1 版本中修正這些問題。

針對穩定的發行版本 (trixie),已在 148.0.7778.167-1~deb13u1 版本中修正這些問題。

建議您升級 chromium 套件。

如需有關 chromium 安全性狀態的詳細資訊,請參閱其安全追蹤頁面:
https://security-tracker.debian.org/tracker/chromium

有關 Debian 安全公告、如何將這些更新套用至您的系統以及常見問題的詳細資訊,請參閱:https://www.debian.org/security/

郵寄清單:[email protected]

Tenable 已直接從 Debian 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 chromium 套件。

另請參閱

https://security-tracker.debian.org/tracker/source-package/chromium

https://security-tracker.debian.org/tracker/CVE-2026-8509

https://security-tracker.debian.org/tracker/CVE-2026-8510

https://security-tracker.debian.org/tracker/CVE-2026-8511

https://security-tracker.debian.org/tracker/CVE-2026-8512

https://security-tracker.debian.org/tracker/CVE-2026-8513

https://security-tracker.debian.org/tracker/CVE-2026-8514

https://security-tracker.debian.org/tracker/CVE-2026-8515

https://security-tracker.debian.org/tracker/CVE-2026-8516

https://security-tracker.debian.org/tracker/CVE-2026-8517

https://security-tracker.debian.org/tracker/CVE-2026-8518

https://security-tracker.debian.org/tracker/CVE-2026-8519

https://security-tracker.debian.org/tracker/CVE-2026-8520

https://security-tracker.debian.org/tracker/CVE-2026-8521

https://security-tracker.debian.org/tracker/CVE-2026-8522

https://security-tracker.debian.org/tracker/CVE-2026-8523

https://security-tracker.debian.org/tracker/CVE-2026-8524

https://security-tracker.debian.org/tracker/CVE-2026-8525

https://security-tracker.debian.org/tracker/CVE-2026-8526

https://security-tracker.debian.org/tracker/CVE-2026-8527

https://security-tracker.debian.org/tracker/CVE-2026-8528

https://security-tracker.debian.org/tracker/CVE-2026-8529

https://security-tracker.debian.org/tracker/CVE-2026-8530

https://security-tracker.debian.org/tracker/CVE-2026-8531

https://security-tracker.debian.org/tracker/CVE-2026-8532

https://security-tracker.debian.org/tracker/CVE-2026-8533

https://security-tracker.debian.org/tracker/CVE-2026-8534

https://security-tracker.debian.org/tracker/CVE-2026-8535

https://security-tracker.debian.org/tracker/CVE-2026-8536

https://security-tracker.debian.org/tracker/CVE-2026-8537

https://security-tracker.debian.org/tracker/CVE-2026-8538

https://security-tracker.debian.org/tracker/CVE-2026-8539

https://security-tracker.debian.org/tracker/CVE-2026-8540

https://security-tracker.debian.org/tracker/CVE-2026-8541

https://security-tracker.debian.org/tracker/CVE-2026-8542

https://security-tracker.debian.org/tracker/CVE-2026-8543

https://security-tracker.debian.org/tracker/CVE-2026-8544

https://security-tracker.debian.org/tracker/CVE-2026-8545

https://security-tracker.debian.org/tracker/CVE-2026-8546

https://security-tracker.debian.org/tracker/CVE-2026-8547

https://security-tracker.debian.org/tracker/CVE-2026-8548

https://security-tracker.debian.org/tracker/CVE-2026-8549

https://security-tracker.debian.org/tracker/CVE-2026-8550

https://security-tracker.debian.org/tracker/CVE-2026-8551

https://security-tracker.debian.org/tracker/CVE-2026-8552

https://security-tracker.debian.org/tracker/CVE-2026-8553

https://security-tracker.debian.org/tracker/CVE-2026-8554

https://security-tracker.debian.org/tracker/CVE-2026-8555

https://security-tracker.debian.org/tracker/CVE-2026-8556

https://security-tracker.debian.org/tracker/CVE-2026-8557

https://security-tracker.debian.org/tracker/CVE-2026-8558

https://security-tracker.debian.org/tracker/CVE-2026-8559

https://security-tracker.debian.org/tracker/CVE-2026-8560

https://security-tracker.debian.org/tracker/CVE-2026-8561

https://security-tracker.debian.org/tracker/CVE-2026-8562

https://security-tracker.debian.org/tracker/CVE-2026-8563

https://security-tracker.debian.org/tracker/CVE-2026-8564

https://security-tracker.debian.org/tracker/CVE-2026-8565

https://security-tracker.debian.org/tracker/CVE-2026-8566

https://security-tracker.debian.org/tracker/CVE-2026-8567

https://security-tracker.debian.org/tracker/CVE-2026-8568

https://security-tracker.debian.org/tracker/CVE-2026-8569

https://security-tracker.debian.org/tracker/CVE-2026-8570

https://security-tracker.debian.org/tracker/CVE-2026-8571

https://security-tracker.debian.org/tracker/CVE-2026-8572

https://security-tracker.debian.org/tracker/CVE-2026-8573

https://security-tracker.debian.org/tracker/CVE-2026-8574

https://security-tracker.debian.org/tracker/CVE-2026-8575

https://security-tracker.debian.org/tracker/CVE-2026-8576

https://security-tracker.debian.org/tracker/CVE-2026-8577

https://security-tracker.debian.org/tracker/CVE-2026-8578

https://security-tracker.debian.org/tracker/CVE-2026-8579

https://security-tracker.debian.org/tracker/CVE-2026-8580

https://security-tracker.debian.org/tracker/CVE-2026-8581

https://security-tracker.debian.org/tracker/CVE-2026-8582

https://security-tracker.debian.org/tracker/CVE-2026-8583

https://security-tracker.debian.org/tracker/CVE-2026-8584

https://security-tracker.debian.org/tracker/CVE-2026-8585

https://security-tracker.debian.org/tracker/CVE-2026-8586

https://security-tracker.debian.org/tracker/CVE-2026-8587

https://packages.debian.org/source/bookworm/chromium

https://packages.debian.org/source/trixie/chromium

Plugin 詳細資訊

嚴重性: Critical

ID: 314979

檔案名稱: debian_DSA-6273.nasl

版本: 1.1

類型: Local

代理程式: unix

已發布: 2026/5/15

已更新: 2026/5/15

支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

風險資訊

VPR

風險因素: Critical

分數: 9.2

CVSS v2

風險因素: Critical

基本分數: 10

時間性分數: 7.4

媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2026-8587

CVSS v3

風險因素: Critical

基本分數: 9.6

時間性分數: 8.3

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

CVSS 評分資料來源: CVE-2026-8580

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:chromium, p-cpe:/a:debian:debian_linux:chromium-common, p-cpe:/a:debian:debian_linux:chromium-driver, p-cpe:/a:debian:debian_linux:chromium-l10n, p-cpe:/a:debian:debian_linux:chromium-sandbox, p-cpe:/a:debian:debian_linux:chromium-shell, cpe:/o:debian:debian_linux:12.0, cpe:/o:debian:debian_linux:13.0, p-cpe:/a:debian:debian_linux:chromium-headless-shell

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2026/5/15

弱點發布日期: 2026/5/12

參考資訊

CVE: CVE-2026-8509, CVE-2026-8510, CVE-2026-8511, CVE-2026-8512, CVE-2026-8513, CVE-2026-8514, CVE-2026-8515, CVE-2026-8516, CVE-2026-8517, CVE-2026-8518, CVE-2026-8519, CVE-2026-8520, CVE-2026-8521, CVE-2026-8522, CVE-2026-8523, CVE-2026-8524, CVE-2026-8525, CVE-2026-8526, CVE-2026-8527, CVE-2026-8528, CVE-2026-8529, CVE-2026-8530, CVE-2026-8531, CVE-2026-8532, CVE-2026-8533, CVE-2026-8534, CVE-2026-8535, CVE-2026-8536, CVE-2026-8537, CVE-2026-8538, CVE-2026-8539, CVE-2026-8540, CVE-2026-8541, CVE-2026-8542, CVE-2026-8543, CVE-2026-8544, CVE-2026-8545, CVE-2026-8546, CVE-2026-8547, CVE-2026-8548, CVE-2026-8549, CVE-2026-8550, CVE-2026-8551, CVE-2026-8552, CVE-2026-8553, CVE-2026-8554, CVE-2026-8555, CVE-2026-8556, CVE-2026-8557, CVE-2026-8558, CVE-2026-8559, CVE-2026-8560, CVE-2026-8561, CVE-2026-8562, CVE-2026-8563, CVE-2026-8564, CVE-2026-8565, CVE-2026-8566, CVE-2026-8567, CVE-2026-8568, CVE-2026-8569, CVE-2026-8570, CVE-2026-8571, CVE-2026-8572, CVE-2026-8573, CVE-2026-8574, CVE-2026-8575, CVE-2026-8576, CVE-2026-8577, CVE-2026-8578, CVE-2026-8579, CVE-2026-8580, CVE-2026-8581, CVE-2026-8582, CVE-2026-8583, CVE-2026-8584, CVE-2026-8585, CVE-2026-8586, CVE-2026-8587