For the Chromium package, the fix has been implemented in version 139.0.7258.154-1~deb12u1 for Bookworm and 139.0.7258.154-1~deb13u1 for Trixie. Similarly, the Unbound vulnerabilities have been resolved in version 1.17.1-2+deb12u3 for Bookworm. Users can find detailed information about the security status of these packages on their respective security tracker pages.
In light of these advisories, it is crucial for users to regularly check for updates and apply security patches promptly to ensure their systems remain secure. Additionally, users should consider setting up automatic updates or subscribing to security mailing lists to stay informed about future vulnerabilities and patches. Regular maintenance and vigilance are key to protecting against potential security breaches
Chromium and Unbound updates for Debian
Debian has released two security advisories: DSA-5988-1 for Chromium for Debian 12 (Bookworm) and 13 (Trixie) and DSA-5987-1 for Unbound for Debian 12 (Bookworm). The Chromium update fixes a vulnerability that could result in the execution of arbitrary code, denial of service, or information disclosure (CVE-2025-9478). The unbound update addresses multiple vulnerabilities, including denial of service and cache poisoning via the "rebirthday attack" (CVE-2024-8508, CVE-2024-33655, CVE-2025-5994). Users are recommended to upgrade their Chromium and unbound packages to fix these security issues.
[SECURITY] [DSA 5988-1] chromium security update
[SECURITY] [DSA 5987-1] unbound security update