Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
More Stories
USN-7055-1: FreeRADIUS vulnerability
Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that FreeRADIUS incorrectly authenticated certain...
USN-7053-1: ImageMagick vulnerabilities
It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were...
USN-7054-1: unzip vulnerability
It was discovered that unzip did not properly handle unicode strings under certain circumstances. If a user were tricked into...
mosquitto-2.0.19-1.fc39
FEDORA-2024-f71b7dad10 Packages in this update: mosquitto-2.0.19-1.fc39 Update description: Update to 2.0.19 Read More
mosquitto-2.0.19-1.fc40
FEDORA-2024-e36b567b66 Packages in this update: mosquitto-2.0.19-1.fc40 Update description: Update to 2.0.19 Read More
mosquitto-2.0.19-1.fc41
FEDORA-2024-0078a55acf Packages in this update: mosquitto-2.0.19-1.fc41 Update description: Update to 2.0.19 Fix FTBFS (closes rhbz#2300978) Read More