chromium is vulnerable to inappropriate implementation in Extensions, which allows an attacker to convince a user to install a malicious extension to inject scripts or HTML into a privileged page via a maliciously crafted Chrome Extension
chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html
crbug.com/1461895
lists.fedoraproject.org/archives/list/[email protected]/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
security-tracker.debian.org/tracker/CVE-2023-4078
security.gentoo.org/glsa/202311-11
security.gentoo.org/glsa/202312-07
security.gentoo.org/glsa/202401-34
www.debian.org/security/2023/dsa-5467