Debian dsa-6250 : chromium - security update

critical Nessus Plugin ID 313110

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 12 / 13 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6250 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-6250-1 [email protected] https://www.debian.org/security/ Andres Salomon May 07, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : chromium CVE ID : CVE-2026-7896 CVE-2026-7897 CVE-2026-7898 CVE-2026-7899 CVE-2026-7900 CVE-2026-7901 CVE-2026-7902 CVE-2026-7903 CVE-2026-7904 CVE-2026-7905 CVE-2026-7906 CVE-2026-7907 CVE-2026-7908 CVE-2026-7909 CVE-2026-7910 CVE-2026-7911 CVE-2026-7912 CVE-2026-7913 CVE-2026-7914 CVE-2026-7915 CVE-2026-7916 CVE-2026-7917 CVE-2026-7918 CVE-2026-7919 CVE-2026-7920 CVE-2026-7921 CVE-2026-7922 CVE-2026-7923 CVE-2026-7924 CVE-2026-7925 CVE-2026-7926 CVE-2026-7927 CVE-2026-7928 CVE-2026-7929 CVE-2026-7930 CVE-2026-7931 CVE-2026-7932 CVE-2026-7933 CVE-2026-7934 CVE-2026-7935 CVE-2026-7936 CVE-2026-7937 CVE-2026-7938 CVE-2026-7939 CVE-2026-7940 CVE-2026-7941 CVE-2026-7942 CVE-2026-7943 CVE-2026-7944 CVE-2026-7945 CVE-2026-7946 CVE-2026-7947 CVE-2026-7948 CVE-2026-7949 CVE-2026-7950 CVE-2026-7951 CVE-2026-7952 CVE-2026-7953 CVE-2026-7954 CVE-2026-7955 CVE-2026-7956 CVE-2026-7957 CVE-2026-7958 CVE-2026-7959 CVE-2026-7960 CVE-2026-7961 CVE-2026-7962 CVE-2026-7963 CVE-2026-7964 CVE-2026-7965 CVE-2026-7966 CVE-2026-7967 CVE-2026-7968 CVE-2026-7969 CVE-2026-7970 CVE-2026-7971 CVE-2026-7972 CVE-2026-7973 CVE-2026-7974 CVE-2026-7975 CVE-2026-7976 CVE-2026-7977 CVE-2026-7978 CVE-2026-7979 CVE-2026-7980 CVE-2026-7981 CVE-2026-7982 CVE-2026-7983 CVE-2026-7984 CVE-2026-7985 CVE-2026-7986 CVE-2026-7987 CVE-2026-7988 CVE-2026-7989 CVE-2026-7990 CVE-2026-7991 CVE-2026-7992 CVE-2026-7993 CVE-2026-7994 CVE-2026-7995 CVE-2026-7996 CVE-2026-7997 CVE-2026-7998 CVE-2026-7999 CVE-2026-8000 CVE-2026-8001 CVE-2026-8002 CVE-2026-8003 CVE-2026-8004 CVE-2026-8005 CVE-2026-8006 CVE-2026-8007 CVE-2026-8008 CVE-2026-8009 CVE-2026-8010 CVE-2026-8011 CVE-2026-8012 CVE-2026-8013 CVE-2026-8014 CVE-2026-8015 CVE-2026-8016 CVE-2026-8017 CVE-2026-8018 CVE-2026-8019 CVE-2026-8020 CVE-2026-8021 CVE-2026-8022

Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.

For the oldstable distribution (bookworm), these problems have been fixed in version 148.0.7778.96-1~deb12u1.

For the stable distribution (trixie), these problems have been fixed in version 148.0.7778.96-1~deb13u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the chromium packages.

See Also

https://security-tracker.debian.org/tracker/source-package/chromium

https://security-tracker.debian.org/tracker/CVE-2026-7896

https://security-tracker.debian.org/tracker/CVE-2026-7897

https://security-tracker.debian.org/tracker/CVE-2026-7898

https://security-tracker.debian.org/tracker/CVE-2026-7899

https://security-tracker.debian.org/tracker/CVE-2026-7900

https://security-tracker.debian.org/tracker/CVE-2026-7901

https://security-tracker.debian.org/tracker/CVE-2026-7902

https://security-tracker.debian.org/tracker/CVE-2026-7903

https://security-tracker.debian.org/tracker/CVE-2026-7904

https://security-tracker.debian.org/tracker/CVE-2026-7905

https://security-tracker.debian.org/tracker/CVE-2026-7906

https://security-tracker.debian.org/tracker/CVE-2026-7907

https://security-tracker.debian.org/tracker/CVE-2026-7908

https://security-tracker.debian.org/tracker/CVE-2026-7909

https://security-tracker.debian.org/tracker/CVE-2026-7910

https://security-tracker.debian.org/tracker/CVE-2026-7911

https://security-tracker.debian.org/tracker/CVE-2026-7912

https://security-tracker.debian.org/tracker/CVE-2026-7913

https://security-tracker.debian.org/tracker/CVE-2026-7914

https://security-tracker.debian.org/tracker/CVE-2026-7915

https://security-tracker.debian.org/tracker/CVE-2026-7916

https://security-tracker.debian.org/tracker/CVE-2026-7917

https://security-tracker.debian.org/tracker/CVE-2026-7918

https://security-tracker.debian.org/tracker/CVE-2026-7919

https://security-tracker.debian.org/tracker/CVE-2026-7920

https://security-tracker.debian.org/tracker/CVE-2026-7921

https://security-tracker.debian.org/tracker/CVE-2026-7922

https://security-tracker.debian.org/tracker/CVE-2026-7923

https://security-tracker.debian.org/tracker/CVE-2026-7924

https://security-tracker.debian.org/tracker/CVE-2026-7925

https://security-tracker.debian.org/tracker/CVE-2026-7926

https://security-tracker.debian.org/tracker/CVE-2026-7927

https://security-tracker.debian.org/tracker/CVE-2026-7928

https://security-tracker.debian.org/tracker/CVE-2026-7929

https://security-tracker.debian.org/tracker/CVE-2026-7930

https://security-tracker.debian.org/tracker/CVE-2026-7931

https://security-tracker.debian.org/tracker/CVE-2026-7932

https://security-tracker.debian.org/tracker/CVE-2026-7933

https://security-tracker.debian.org/tracker/CVE-2026-7934

https://security-tracker.debian.org/tracker/CVE-2026-7935

https://security-tracker.debian.org/tracker/CVE-2026-7936

https://security-tracker.debian.org/tracker/CVE-2026-7937

https://security-tracker.debian.org/tracker/CVE-2026-7938

https://security-tracker.debian.org/tracker/CVE-2026-7939

https://security-tracker.debian.org/tracker/CVE-2026-7940

https://security-tracker.debian.org/tracker/CVE-2026-7941

https://security-tracker.debian.org/tracker/CVE-2026-7942

https://security-tracker.debian.org/tracker/CVE-2026-7943

https://security-tracker.debian.org/tracker/CVE-2026-7944

https://security-tracker.debian.org/tracker/CVE-2026-7945

https://security-tracker.debian.org/tracker/CVE-2026-7946

https://security-tracker.debian.org/tracker/CVE-2026-7947

https://security-tracker.debian.org/tracker/CVE-2026-7948

https://security-tracker.debian.org/tracker/CVE-2026-7949

https://security-tracker.debian.org/tracker/CVE-2026-7950

https://security-tracker.debian.org/tracker/CVE-2026-7951

https://security-tracker.debian.org/tracker/CVE-2026-7952

https://security-tracker.debian.org/tracker/CVE-2026-7953

https://security-tracker.debian.org/tracker/CVE-2026-7954

https://security-tracker.debian.org/tracker/CVE-2026-7955

https://security-tracker.debian.org/tracker/CVE-2026-7956

https://security-tracker.debian.org/tracker/CVE-2026-7957

https://security-tracker.debian.org/tracker/CVE-2026-7958

https://security-tracker.debian.org/tracker/CVE-2026-7959

https://security-tracker.debian.org/tracker/CVE-2026-7960

https://security-tracker.debian.org/tracker/CVE-2026-7961

https://security-tracker.debian.org/tracker/CVE-2026-7962

https://security-tracker.debian.org/tracker/CVE-2026-7963

https://security-tracker.debian.org/tracker/CVE-2026-7964

https://security-tracker.debian.org/tracker/CVE-2026-7965

https://security-tracker.debian.org/tracker/CVE-2026-7966

https://security-tracker.debian.org/tracker/CVE-2026-7967

https://security-tracker.debian.org/tracker/CVE-2026-7968

https://security-tracker.debian.org/tracker/CVE-2026-7969

https://security-tracker.debian.org/tracker/CVE-2026-7970

https://security-tracker.debian.org/tracker/CVE-2026-7971

https://security-tracker.debian.org/tracker/CVE-2026-7972

https://security-tracker.debian.org/tracker/CVE-2026-7973

https://security-tracker.debian.org/tracker/CVE-2026-7974

https://security-tracker.debian.org/tracker/CVE-2026-7975

https://security-tracker.debian.org/tracker/CVE-2026-7976

https://security-tracker.debian.org/tracker/CVE-2026-7977

https://security-tracker.debian.org/tracker/CVE-2026-7978

https://security-tracker.debian.org/tracker/CVE-2026-7979

https://security-tracker.debian.org/tracker/CVE-2026-7980

https://security-tracker.debian.org/tracker/CVE-2026-7981

https://security-tracker.debian.org/tracker/CVE-2026-7982

https://security-tracker.debian.org/tracker/CVE-2026-7983

https://security-tracker.debian.org/tracker/CVE-2026-7984

https://security-tracker.debian.org/tracker/CVE-2026-7985

https://security-tracker.debian.org/tracker/CVE-2026-7986

https://security-tracker.debian.org/tracker/CVE-2026-7987

https://security-tracker.debian.org/tracker/CVE-2026-7988

https://security-tracker.debian.org/tracker/CVE-2026-7989

https://security-tracker.debian.org/tracker/CVE-2026-7990

https://security-tracker.debian.org/tracker/CVE-2026-7991

https://security-tracker.debian.org/tracker/CVE-2026-7992

https://security-tracker.debian.org/tracker/CVE-2026-7993

https://security-tracker.debian.org/tracker/CVE-2026-7994

https://security-tracker.debian.org/tracker/CVE-2026-7995

https://security-tracker.debian.org/tracker/CVE-2026-7996

https://security-tracker.debian.org/tracker/CVE-2026-7997

https://security-tracker.debian.org/tracker/CVE-2026-7998

https://security-tracker.debian.org/tracker/CVE-2026-7999

https://security-tracker.debian.org/tracker/CVE-2026-8000

https://security-tracker.debian.org/tracker/CVE-2026-8001

https://security-tracker.debian.org/tracker/CVE-2026-8002

https://security-tracker.debian.org/tracker/CVE-2026-8003

https://security-tracker.debian.org/tracker/CVE-2026-8004

https://security-tracker.debian.org/tracker/CVE-2026-8005

https://security-tracker.debian.org/tracker/CVE-2026-8006

https://security-tracker.debian.org/tracker/CVE-2026-8007

https://security-tracker.debian.org/tracker/CVE-2026-8008

https://security-tracker.debian.org/tracker/CVE-2026-8009

https://security-tracker.debian.org/tracker/CVE-2026-8010

https://security-tracker.debian.org/tracker/CVE-2026-8011

https://security-tracker.debian.org/tracker/CVE-2026-8012

https://security-tracker.debian.org/tracker/CVE-2026-8013

https://security-tracker.debian.org/tracker/CVE-2026-8014

https://security-tracker.debian.org/tracker/CVE-2026-8015

https://security-tracker.debian.org/tracker/CVE-2026-8016

https://security-tracker.debian.org/tracker/CVE-2026-8017

https://security-tracker.debian.org/tracker/CVE-2026-8018

https://security-tracker.debian.org/tracker/CVE-2026-8019

https://security-tracker.debian.org/tracker/CVE-2026-8020

https://security-tracker.debian.org/tracker/CVE-2026-8021

https://security-tracker.debian.org/tracker/CVE-2026-8022

https://packages.debian.org/source/bookworm/chromium

https://packages.debian.org/source/trixie/chromium

Plugin Details

Severity: Critical

ID: 313110

File Name: debian_DSA-6250.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/7/2026

Updated: 5/7/2026

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-7927

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 8.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2026-7910

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:chromium-common, p-cpe:/a:debian:debian_linux:chromium-l10n, p-cpe:/a:debian:debian_linux:chromium-shell, p-cpe:/a:debian:debian_linux:chromium, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:debian:debian_linux:chromium-headless-shell, p-cpe:/a:debian:debian_linux:chromium-sandbox, p-cpe:/a:debian:debian_linux:chromium-driver, cpe:/o:debian:debian_linux:13.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 5/7/2026

Vulnerability Publication Date: 5/5/2026

Reference Information

CVE: CVE-2026-7896, CVE-2026-7897, CVE-2026-7898, CVE-2026-7899, CVE-2026-7900, CVE-2026-7901, CVE-2026-7902, CVE-2026-7903, CVE-2026-7904, CVE-2026-7905, CVE-2026-7906, CVE-2026-7907, CVE-2026-7908, CVE-2026-7909, CVE-2026-7910, CVE-2026-7911, CVE-2026-7912, CVE-2026-7913, CVE-2026-7914, CVE-2026-7915, CVE-2026-7916, CVE-2026-7917, CVE-2026-7918, CVE-2026-7919, CVE-2026-7920, CVE-2026-7921, CVE-2026-7922, CVE-2026-7923, CVE-2026-7924, CVE-2026-7925, CVE-2026-7926, CVE-2026-7927, CVE-2026-7928, CVE-2026-7929, CVE-2026-7930, CVE-2026-7931, CVE-2026-7932, CVE-2026-7933, CVE-2026-7934, CVE-2026-7935, CVE-2026-7936, CVE-2026-7937, CVE-2026-7938, CVE-2026-7939, CVE-2026-7940, CVE-2026-7941, CVE-2026-7942, CVE-2026-7943, CVE-2026-7944, CVE-2026-7945, CVE-2026-7946, CVE-2026-7947, CVE-2026-7948, CVE-2026-7949, CVE-2026-7950, CVE-2026-7951, CVE-2026-7952, CVE-2026-7953, CVE-2026-7954, CVE-2026-7955, CVE-2026-7956, CVE-2026-7957, CVE-2026-7958, CVE-2026-7959, CVE-2026-7960, CVE-2026-7961, CVE-2026-7962, CVE-2026-7963, CVE-2026-7964, CVE-2026-7965, CVE-2026-7966, CVE-2026-7967, CVE-2026-7968, CVE-2026-7969, CVE-2026-7970, CVE-2026-7971, CVE-2026-7972, CVE-2026-7973, CVE-2026-7974, CVE-2026-7975, CVE-2026-7976, CVE-2026-7977, CVE-2026-7978, CVE-2026-7979, CVE-2026-7980, CVE-2026-7981, CVE-2026-7982, CVE-2026-7983, CVE-2026-7984, CVE-2026-7985, CVE-2026-7986, CVE-2026-7987, CVE-2026-7988, CVE-2026-7989, CVE-2026-7990, CVE-2026-7991, CVE-2026-7992, CVE-2026-7993, CVE-2026-7994, CVE-2026-7995, CVE-2026-7996, CVE-2026-7997, CVE-2026-7998, CVE-2026-7999, CVE-2026-8000, CVE-2026-8001, CVE-2026-8002, CVE-2026-8003, CVE-2026-8004, CVE-2026-8005, CVE-2026-8006, CVE-2026-8007, CVE-2026-8008, CVE-2026-8009, CVE-2026-8010, CVE-2026-8011, CVE-2026-8012, CVE-2026-8013, CVE-2026-8014, CVE-2026-8015, CVE-2026-8016, CVE-2026-8017, CVE-2026-8018, CVE-2026-8019, CVE-2026-8020, CVE-2026-8021, CVE-2026-8022