Debian dsa-6250:chromium - 安全更新

critical Nessus 插件 ID 313110

简介

远程 Debian 主机上缺少一个或多个与安全相关的更新。

描述

远程 Debian 12/13 主机上安装的多个程序包受到 dsa-6250 公告中提及的多个漏洞影响。

- ------------------------------------------------------------------------- Debian 安全公告 DSA-6250-1 [email protected] https://www.debian.org/security/Andres Salomon 2026 年 5 月 7 日https://www.debian.org/security/faq
- -------------------------------------------------------------------------

程序包:chromium CVE ID:CVE-2026-7896 CVE-2026-7897 CVE-2026-7898 CVE-2026-7899 CVE-2026-7900 CVE-2026-7901 CVE-2026-7902 CVE-2026-7903 CVE-2026-7904 CVE-2026-7905 CVE-2026-7906 CVE-2026-7907 CVE-2026-7908 CVE-2026-7909 CVE-2026-7910 CVE-2026-7911 CVE-2026-7912 CVE-2026-7913 CVE-2026-7914 CVE-2026-7915 CVE-2026-7916 CVE-2026-7917 CVE-2026-7918 CVE-2026-7919 CVE-2026-7920 CVE-2026-7921 CVE-2026-7922 CVE-2026-7923 CVE-2026-7924 CVE-2026-7925 CVE-2026-7926 CVE-2026-7927 CVE-2026-7928 CVE-2026-7929 CVE-2026-7930 CVE-2026-7931 CVE-2026-7932 CVE-2026-7933 CVE-2026-7934 CVE-2026-7935 CVE-2026-7936 CVE-2026-7937 CVE-2026-7938 CVE-2026-7939 CVE-2026-7940 CVE-2026-7941 CVE-2026-7942 CVE-2026-7943 CVE-2026-7944 CVE-2026-7945 CVE-2026-7946 CVE-2026-7947 CVE-2026-7948 CVE-2026-7949 CVE-2026-7950 CVE-2026-7951 CVE-2026-7952 CVE-2026-7953 CVE-2026-7954 CVE-2026-7955 CVE-2026-7956 CVE-2026-7957 CVE-2026-7958 CVE-2026-7959 CVE-2026-7960 CVE-2026-7961 CVE-2026-7962 CVE-2026-7963 CVE-2026-7964 CVE-2026-7965 CVE-2026-7966 CVE-2026-7967 CVE-2026-7968 CVE-2026-7969 CVE-2026-7970 CVE-2026-7971 CVE-2026-7972 CVE-2026-7973 CVE-2026-7974 CVE-2026-7975 CVE-2026-7976 CVE-2026-7977 CVE-2026-7978 CVE-2026-7979 CVE-2026-7980 CVE-2026-7981 CVE-2026-7982 CVE-2026-7983 CVE-2026-7984 CVE-2026-7985 CVE-2026-7986 CVE-2026-7987 CVE-2026-7988 CVE-2026-7989 CVE-2026-7990 CVE-2026-7991 CVE-2026-7992 CVE-2026-7993 CVE-2026-7994 CVE-2026-7995 CVE-2026-7996 CVE-2026-7997 CVE-2026-7998 CVE-2026-7999 CVE-2026-8000 CVE-2026-8001 CVE-2026-8002 CVE-2026-8003 CVE-2026-8004 CVE-2026-8005 CVE-2026-8006 CVE-2026-8007 CVE-2026-8008 CVE-2026-8009 CVE-2026-8010 CVE-2026-8011 CVE-2026-8012 CVE-2026-8013 CVE-2026-8014 CVE-2026-8015 CVE-2026-8016 CVE-2026-8017 CVE-2026-8018 CVE-2026-8019 CVE-2026-8020 CVE-2026-8021 CVE-2026-8022

在 Chromium 中发现多个安全问题,这些问题可能会造成任意代码执行、拒绝服务或信息泄露。

对于旧稳定发行版本 (bookworm),已在 148.0.7778.96-1~deb12u1 版本中修复这些问题。

对于稳定发行版本 (trixie),已在 148.0.7778.96-1~deb13u1 版本中修复这些问题。

我们建议您升级 chromium 程序包。

如需了解 chromium 的详细安全状态,请参阅其安全跟踪页面:
https://security-tracker.debian.org/tracker/chromium

有关 Debian 安全公告、如何将这些更新应用到系统以及常见问题解答的更多信息,请访问以下网址:https://www.debian.org/security/

邮件列表:[email protected]

Tenable 已直接从 Debian 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

升级 chromium 程序包。

另见

https://security-tracker.debian.org/tracker/source-package/chromium

https://security-tracker.debian.org/tracker/CVE-2026-7896

https://security-tracker.debian.org/tracker/CVE-2026-7897

https://security-tracker.debian.org/tracker/CVE-2026-7898

https://security-tracker.debian.org/tracker/CVE-2026-7899

https://security-tracker.debian.org/tracker/CVE-2026-7900

https://security-tracker.debian.org/tracker/CVE-2026-7901

https://security-tracker.debian.org/tracker/CVE-2026-7902

https://security-tracker.debian.org/tracker/CVE-2026-7903

https://security-tracker.debian.org/tracker/CVE-2026-7904

https://security-tracker.debian.org/tracker/CVE-2026-7905

https://security-tracker.debian.org/tracker/CVE-2026-7906

https://security-tracker.debian.org/tracker/CVE-2026-7907

https://security-tracker.debian.org/tracker/CVE-2026-7908

https://security-tracker.debian.org/tracker/CVE-2026-7909

https://security-tracker.debian.org/tracker/CVE-2026-7910

https://security-tracker.debian.org/tracker/CVE-2026-7911

https://security-tracker.debian.org/tracker/CVE-2026-7912

https://security-tracker.debian.org/tracker/CVE-2026-7913

https://security-tracker.debian.org/tracker/CVE-2026-7914

https://security-tracker.debian.org/tracker/CVE-2026-7915

https://security-tracker.debian.org/tracker/CVE-2026-7916

https://security-tracker.debian.org/tracker/CVE-2026-7917

https://security-tracker.debian.org/tracker/CVE-2026-7918

https://security-tracker.debian.org/tracker/CVE-2026-7919

https://security-tracker.debian.org/tracker/CVE-2026-7920

https://security-tracker.debian.org/tracker/CVE-2026-7921

https://security-tracker.debian.org/tracker/CVE-2026-7922

https://security-tracker.debian.org/tracker/CVE-2026-7923

https://security-tracker.debian.org/tracker/CVE-2026-7924

https://security-tracker.debian.org/tracker/CVE-2026-7925

https://security-tracker.debian.org/tracker/CVE-2026-7926

https://security-tracker.debian.org/tracker/CVE-2026-7927

https://security-tracker.debian.org/tracker/CVE-2026-7928

https://security-tracker.debian.org/tracker/CVE-2026-7929

https://security-tracker.debian.org/tracker/CVE-2026-7930

https://security-tracker.debian.org/tracker/CVE-2026-7931

https://security-tracker.debian.org/tracker/CVE-2026-7932

https://security-tracker.debian.org/tracker/CVE-2026-7933

https://security-tracker.debian.org/tracker/CVE-2026-7934

https://security-tracker.debian.org/tracker/CVE-2026-7935

https://security-tracker.debian.org/tracker/CVE-2026-7936

https://security-tracker.debian.org/tracker/CVE-2026-7937

https://security-tracker.debian.org/tracker/CVE-2026-7938

https://security-tracker.debian.org/tracker/CVE-2026-7939

https://security-tracker.debian.org/tracker/CVE-2026-7940

https://security-tracker.debian.org/tracker/CVE-2026-7941

https://security-tracker.debian.org/tracker/CVE-2026-7942

https://security-tracker.debian.org/tracker/CVE-2026-7943

https://security-tracker.debian.org/tracker/CVE-2026-7944

https://security-tracker.debian.org/tracker/CVE-2026-7945

https://security-tracker.debian.org/tracker/CVE-2026-7946

https://security-tracker.debian.org/tracker/CVE-2026-7947

https://security-tracker.debian.org/tracker/CVE-2026-7948

https://security-tracker.debian.org/tracker/CVE-2026-7949

https://security-tracker.debian.org/tracker/CVE-2026-7950

https://security-tracker.debian.org/tracker/CVE-2026-7951

https://security-tracker.debian.org/tracker/CVE-2026-7952

https://security-tracker.debian.org/tracker/CVE-2026-7953

https://security-tracker.debian.org/tracker/CVE-2026-7954

https://security-tracker.debian.org/tracker/CVE-2026-7955

https://security-tracker.debian.org/tracker/CVE-2026-7956

https://security-tracker.debian.org/tracker/CVE-2026-7957

https://security-tracker.debian.org/tracker/CVE-2026-7958

https://security-tracker.debian.org/tracker/CVE-2026-7959

https://security-tracker.debian.org/tracker/CVE-2026-7960

https://security-tracker.debian.org/tracker/CVE-2026-7961

https://security-tracker.debian.org/tracker/CVE-2026-7962

https://security-tracker.debian.org/tracker/CVE-2026-7963

https://security-tracker.debian.org/tracker/CVE-2026-7964

https://security-tracker.debian.org/tracker/CVE-2026-7965

https://security-tracker.debian.org/tracker/CVE-2026-7966

https://security-tracker.debian.org/tracker/CVE-2026-7967

https://security-tracker.debian.org/tracker/CVE-2026-7968

https://security-tracker.debian.org/tracker/CVE-2026-7969

https://security-tracker.debian.org/tracker/CVE-2026-7970

https://security-tracker.debian.org/tracker/CVE-2026-7971

https://security-tracker.debian.org/tracker/CVE-2026-7972

https://security-tracker.debian.org/tracker/CVE-2026-7973

https://security-tracker.debian.org/tracker/CVE-2026-7974

https://security-tracker.debian.org/tracker/CVE-2026-7975

https://security-tracker.debian.org/tracker/CVE-2026-7976

https://security-tracker.debian.org/tracker/CVE-2026-7977

https://security-tracker.debian.org/tracker/CVE-2026-7978

https://security-tracker.debian.org/tracker/CVE-2026-7979

https://security-tracker.debian.org/tracker/CVE-2026-7980

https://security-tracker.debian.org/tracker/CVE-2026-7981

https://security-tracker.debian.org/tracker/CVE-2026-7982

https://security-tracker.debian.org/tracker/CVE-2026-7983

https://security-tracker.debian.org/tracker/CVE-2026-7984

https://security-tracker.debian.org/tracker/CVE-2026-7985

https://security-tracker.debian.org/tracker/CVE-2026-7986

https://security-tracker.debian.org/tracker/CVE-2026-7987

https://security-tracker.debian.org/tracker/CVE-2026-7988

https://security-tracker.debian.org/tracker/CVE-2026-7989

https://security-tracker.debian.org/tracker/CVE-2026-7990

https://security-tracker.debian.org/tracker/CVE-2026-7991

https://security-tracker.debian.org/tracker/CVE-2026-7992

https://security-tracker.debian.org/tracker/CVE-2026-7993

https://security-tracker.debian.org/tracker/CVE-2026-7994

https://security-tracker.debian.org/tracker/CVE-2026-7995

https://security-tracker.debian.org/tracker/CVE-2026-7996

https://security-tracker.debian.org/tracker/CVE-2026-7997

https://security-tracker.debian.org/tracker/CVE-2026-7998

https://security-tracker.debian.org/tracker/CVE-2026-7999

https://security-tracker.debian.org/tracker/CVE-2026-8000

https://security-tracker.debian.org/tracker/CVE-2026-8001

https://security-tracker.debian.org/tracker/CVE-2026-8002

https://security-tracker.debian.org/tracker/CVE-2026-8003

https://security-tracker.debian.org/tracker/CVE-2026-8004

https://security-tracker.debian.org/tracker/CVE-2026-8005

https://security-tracker.debian.org/tracker/CVE-2026-8006

https://security-tracker.debian.org/tracker/CVE-2026-8007

https://security-tracker.debian.org/tracker/CVE-2026-8008

https://security-tracker.debian.org/tracker/CVE-2026-8009

https://security-tracker.debian.org/tracker/CVE-2026-8010

https://security-tracker.debian.org/tracker/CVE-2026-8011

https://security-tracker.debian.org/tracker/CVE-2026-8012

https://security-tracker.debian.org/tracker/CVE-2026-8013

https://security-tracker.debian.org/tracker/CVE-2026-8014

https://security-tracker.debian.org/tracker/CVE-2026-8015

https://security-tracker.debian.org/tracker/CVE-2026-8016

https://security-tracker.debian.org/tracker/CVE-2026-8017

https://security-tracker.debian.org/tracker/CVE-2026-8018

https://security-tracker.debian.org/tracker/CVE-2026-8019

https://security-tracker.debian.org/tracker/CVE-2026-8020

https://security-tracker.debian.org/tracker/CVE-2026-8021

https://security-tracker.debian.org/tracker/CVE-2026-8022

https://packages.debian.org/source/bookworm/chromium

https://packages.debian.org/source/trixie/chromium

插件详情

严重性: Critical

ID: 313110

文件名: debian_DSA-6250.nasl

版本: 1.1

类型: Local

代理: unix

发布时间: 2026/5/7

最近更新时间: 2026/5/7

支持的传感器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: High

分数: 8.4

CVSS v2

风险因素: Critical

基本分数: 10

时间分数: 7.4

矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS 分数来源: CVE-2026-7927

CVSS v3

风险因素: Critical

基本分数: 9.6

时间分数: 8.3

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

CVSS 分数来源: CVE-2026-7910

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:chromium-common, p-cpe:/a:debian:debian_linux:chromium-l10n, p-cpe:/a:debian:debian_linux:chromium-shell, p-cpe:/a:debian:debian_linux:chromium, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:debian:debian_linux:chromium-headless-shell, p-cpe:/a:debian:debian_linux:chromium-sandbox, p-cpe:/a:debian:debian_linux:chromium-driver, cpe:/o:debian:debian_linux:13.0

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

易利用性: No known exploits are available

补丁发布日期: 2026/5/7

漏洞发布日期: 2026/5/5

参考资料信息

CVE: CVE-2026-7896, CVE-2026-7897, CVE-2026-7898, CVE-2026-7899, CVE-2026-7900, CVE-2026-7901, CVE-2026-7902, CVE-2026-7903, CVE-2026-7904, CVE-2026-7905, CVE-2026-7906, CVE-2026-7907, CVE-2026-7908, CVE-2026-7909, CVE-2026-7910, CVE-2026-7911, CVE-2026-7912, CVE-2026-7913, CVE-2026-7914, CVE-2026-7915, CVE-2026-7916, CVE-2026-7917, CVE-2026-7918, CVE-2026-7919, CVE-2026-7920, CVE-2026-7921, CVE-2026-7922, CVE-2026-7923, CVE-2026-7924, CVE-2026-7925, CVE-2026-7926, CVE-2026-7927, CVE-2026-7928, CVE-2026-7929, CVE-2026-7930, CVE-2026-7931, CVE-2026-7932, CVE-2026-7933, CVE-2026-7934, CVE-2026-7935, CVE-2026-7936, CVE-2026-7937, CVE-2026-7938, CVE-2026-7939, CVE-2026-7940, CVE-2026-7941, CVE-2026-7942, CVE-2026-7943, CVE-2026-7944, CVE-2026-7945, CVE-2026-7946, CVE-2026-7947, CVE-2026-7948, CVE-2026-7949, CVE-2026-7950, CVE-2026-7951, CVE-2026-7952, CVE-2026-7953, CVE-2026-7954, CVE-2026-7955, CVE-2026-7956, CVE-2026-7957, CVE-2026-7958, CVE-2026-7959, CVE-2026-7960, CVE-2026-7961, CVE-2026-7962, CVE-2026-7963, CVE-2026-7964, CVE-2026-7965, CVE-2026-7966, CVE-2026-7967, CVE-2026-7968, CVE-2026-7969, CVE-2026-7970, CVE-2026-7971, CVE-2026-7972, CVE-2026-7973, CVE-2026-7974, CVE-2026-7975, CVE-2026-7976, CVE-2026-7977, CVE-2026-7978, CVE-2026-7979, CVE-2026-7980, CVE-2026-7981, CVE-2026-7982, CVE-2026-7983, CVE-2026-7984, CVE-2026-7985, CVE-2026-7986, CVE-2026-7987, CVE-2026-7988, CVE-2026-7989, CVE-2026-7990, CVE-2026-7991, CVE-2026-7992, CVE-2026-7993, CVE-2026-7994, CVE-2026-7995, CVE-2026-7996, CVE-2026-7997, CVE-2026-7998, CVE-2026-7999, CVE-2026-8000, CVE-2026-8001, CVE-2026-8002, CVE-2026-8003, CVE-2026-8004, CVE-2026-8005, CVE-2026-8006, CVE-2026-8007, CVE-2026-8008, CVE-2026-8009, CVE-2026-8010, CVE-2026-8011, CVE-2026-8012, CVE-2026-8013, CVE-2026-8014, CVE-2026-8015, CVE-2026-8016, CVE-2026-8017, CVE-2026-8018, CVE-2026-8019, CVE-2026-8020, CVE-2026-8021, CVE-2026-8022