Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could view, change, or delete data. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.
More Stories
dotnet8.0-8.0.114-1.fc40
FEDORA-2025-83c147615e Packages in this update: dotnet8.0-8.0.114-1.fc40 Update description: This is the monthly update for .NET for March 2025. Release Notes:...
dotnet8.0-8.0.114-1.fc41
FEDORA-2025-adbd75f500 Packages in this update: dotnet8.0-8.0.114-1.fc41 Update description: This is the monthly update for .NET for March 2025. Release Notes:...
dotnet8.0-8.0.114-1.fc42
FEDORA-2025-54ac622cef Packages in this update: dotnet8.0-8.0.114-1.fc42 Update description: This is the monthly update for .NET for March 2025. Release Notes:...
USN-7328-3: Linux kernel vulnerabilities
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker...
expat-2.7.0-1.fc40
FEDORA-2025-d487e15b69 Packages in this update: expat-2.7.0-1.fc40 Update description: Rebase to 2.7.0 Read More
expat-2.7.0-1.fc41
FEDORA-2025-20e86a3c86 Packages in this update: expat-2.7.0-1.fc41 Update description: Rebase to 2.7.0 Read More