Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
More Stories
USN-7188-1: FFmpeg vulnerability
It was discovered that FFmpeg incorrectly handled certain input, which could lead to an integer overflow. An attacker could possibly...
USN-7179-3: Linux kernel (GKE) vulnerabilities
Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote...
USN-7169-3: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...
USN-7167-2: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...
firefox-134.0-1.fc41
FEDORA-2025-6fcde64d77 Packages in this update: firefox-134.0-1.fc41 Update description: Updated to latest upstream (134.0) Read More
firefox-134.0-1.fc40
FEDORA-2025-e8a71b6caf Packages in this update: firefox-134.0-1.fc40 Update description: Updated to latest upstream (134.0) Read More