PT-2025-34809 · Google +3 · Google Chrome +3
Published
2025-08-11
·
Updated
2025-11-21
·
CVE-2025-9478
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Google Chrome versions prior to 139.0.7258.154
Chromium versions prior to 139.0.7258.154-1deb12u1 (bookworm)
Chromium versions prior to 139.0.7258.154-1deb13u1 (trixie)
Chromium version 140.0.7339.80-alt0.p11.1
Description
A critical issue exists in the ANGLE graphics library used by Google Chrome and Chromium. This flaw is a use-after-free condition, which could allow a remote attacker to potentially exploit heap corruption through a specially crafted HTML page. The vulnerability was discovered by Google’s AI agent, Big Sleep. Exploitation of this issue may lead to arbitrary code execution.
Recommendations
Google Chrome versions prior to 139.0.7258.154: Update to version 139.0.7258.154 or later.
Chromium versions prior to 139.0.7258.154-1deb12u1 (bookworm): Upgrade to version 139.0.7258.154-1deb12u1 or later.
Chromium versions prior to 139.0.7258.154-1deb13u1 (trixie): Upgrade to version 139.0.7258.154-1deb13u1 or later.
Chromium version 140.0.7339.80-alt0.p11.1: No specific action is required as this is the updated version.
Fix
RCE
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
ALT-PU-2025-11532
BDU:2025-10882
CVE-2025-9478
DSA-5988-1
Affected Products
Alt Linux
Debian
Google Chrome
Red Os
References · 65
- https://bdu.fstec.ru/vul/2025-10882 · Security Note
- https://osv.dev/vulnerability/DSA-5988-1 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-1020SE47 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-11128 · Security Note
- https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-1113SE18 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-9478 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-9478 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9865 · Security Note
- https://security-tracker.debian.org/tracker/DSA-5988-1 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2025-11532 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9867 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9478 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9478 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-11126 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/724302 · Security Note