Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger information disclosure, remote code execution and privilege escalation on the targeted system.
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Before installation of the software, please visit the software vendor web-site for more details. Apply fixes issued by the vendor:
The information provided herein is on an “as is” basis, without warranty of any kind.