It was reported that incorrect bound checks in the dsaVerify function
in node-browserify-sign, a Node.js library which adds crypto signing
for browsers, allows an attacker to perform signature forgery attacks
by constructing signatures that can be successfully verified by any
public key.
More Stories
Windows CLFS Driver Elevation of Privilege
What is the Vulnerability?A zero-day vulnerability has recently been identified in the Common Log File System (CLFS) kernel driver. CLFS...
USN-7432-1: libsoup vulnerabilities
It was discovered that libsoup could be made to read out of bounds. An attacker could possibly use this issue...
chromium-135.0.7049.84-1.fc40
FEDORA-2025-4ad8f5e805 Packages in this update: chromium-135.0.7049.84-1.fc40 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...
chromium-135.0.7049.84-1.el10_1
FEDORA-EPEL-2025-d2ac333cd9 Packages in this update: chromium-135.0.7049.84-1.el10_1 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...
chromium-135.0.7049.84-1.el9
FEDORA-EPEL-2025-6930d627d4 Packages in this update: chromium-135.0.7049.84-1.el9 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...
chromium-135.0.7049.84-1.fc41
FEDORA-2025-20e35f4f9f Packages in this update: chromium-135.0.7049.84-1.fc41 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...