A government site lists the latest documented security flaws. In recent days, vulnerabilities in Chrome, Windows and Linux have been identified. Do not forget to update your devices to get recent security patches.
A reminder bite never done, cybermalvence.gouv.fr reminds Internet users that it is important to maintain your devices and software up to date to protect yourself from vulnerabilities. “Hundreds of safety flaws corrected in January updates”published the government on X (Twitter).
“Some of these flaws are critical and used by criminals. Update PC, phones, servers … without delay!“, Adds cybermalveillance.gouv.fr, who mentions Windows, Office, Edge, Google Chrome, Mozilla Firefox, Android, Cisco ou encore Oracle.
Windows in Windows, Chrome, Linux …
The government also makes it known that users can obtain more information on the latest discovery security flaws by going to the website of the government center, alert and response to computer attacks (CERT-FR), which depends on The National Agency for Information Systems Security (ANSSI).
-There are the latest security opinions. For example, on January 24, 2025, there are reports concerning “Multiple vulnerabilities in the Linux kernel” of several distributions such as Ubuntu, Susa or Red Hat. For each notice, a precise list of affected systems is informed. We also learn what are the risks involved because of this security flaw. In the case of these Linux vulnerabilities, we have:
- Damage to data integrity
- Damage to data confidentiality
- Bypassing the security policy
- Remote service denial
- Arbitrary code execution
- Not specified by the editor
- Elevation of privileges
If we go back a little in time, we can see a report dating from January 23, 2025 for Google Chrome, but it is less well documented. It informs well what are the versions of the software on Windows, Mac and Linux which are affected, but we have no details on the security faults concerned and the risks.
A few days earlier, it is a vulnerability in many versions of Windows 10 and 11, allowing an attacker to cause an elevation of privileges, which was documented by Cert-FR. It can therefore be interesting to get there from time to time to keep up to date.