FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2026-04-11 08:28:37 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
1dc2aae1-0793-4dbd-8548-e63ae0e1bdafchromium -- security fixes

Chrome Releases reports:

This update includes 21 security fixes:

  • [493952652] High CVE-2026-5273: Use after free in CSS. Reported by Anonymous on 2026-03-18
  • [491732188] High CVE-2026-5272: Heap buffer overflow in GPU. Reported by inspector-ambitious on 2026-03-11
  • [488596746] High CVE-2026-5274: Integer overflow in Codecs. Reported by heapracer (@heapracer) on 2026-03-01
  • [489494022] High CVE-2026-5275: Heap buffer overflow in ANGLE. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-04
  • [489711638] High CVE-2026-5276: Insufficient policy enforcement in WebUSB. Reported by Ariel Simon on 2026-03-04
  • [489791424] High CVE-2026-5277: Integer overflow in ANGLE. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-05
  • [490254128] High CVE-2026-5278: Use after free in Web MIDI. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-06
  • [490642836] High CVE-2026-5279: Object corruption in V8. Reported by Hyeonjun Ahn (@_deayzl) on 2026-03-08
  • [491515787] High CVE-2026-5280: Use after free in WebCodecs. Reported by heapracer (@heapracer) on 2026-03-11
  • [491518608] High CVE-2026-5281: Use after free in Dawn. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-10
  • [491655161] High CVE-2026-5282: Out of bounds read in WebCodecs. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-11
  • [492131521] High CVE-2026-5283: Inappropriate implementation in ANGLE. Reported by sweetchip on 2026-03-12
  • [492139412] High CVE-2026-5284: Use after free in Dawn. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-12
  • [492228019] High CVE-2026-5285: Use after free in WebGL. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-13
  • [493900619] High CVE-2026-5286: Use after free in Dawn. Reported by sweetchip on 2026-03-18
  • [494644471] High CVE-2026-5287: Use after free in PDF. Reported by Syn4pse on 2026-03-21
  • [495507390] High CVE-2026-5288: Use after free in WebView. Reported by Google on 2026-03-23
  • [495931147] High CVE-2026-5289: Use after free in Navigation. Reported by Google on 2026-03-25
  • [496205576] High CVE-2026-5290: Use after free in Compositing. Reported by Google on 2026-03-25
  • [490118036] Medium CVE-2026-5291: Inappropriate implementation in WebGL. Reported by heapracer (@heapracer) on 2026-03-06
  • [492213293] Medium CVE-2026-5292: Out of bounds read in WebCodecs. Reported by Google on 2026-03-12

Discovery 2026-03-31
Entry 2026-04-01
chromium
< 146.0.7680.177

ungoogled-chromium
< 146.0.7680.177

CVE-2026-5273
CVE-2026-5272
CVE-2026-5274
CVE-2026-5275
CVE-2026-5276
CVE-2026-5277
CVE-2026-5278
CVE-2026-5279
CVE-2026-5280
CVE-2026-5281
CVE-2026-5282
CVE-2026-5283
CVE-2026-5284
CVE-2026-5285
CVE-2026-5286
CVE-2026-5287
CVE-2026-5288
CVE-2026-5289
CVE-2026-5290
CVE-2026-5291
CVE-2026-5292
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html
4b727a1a-5034-42b4-b29b-2289389f4ba8chromium -- security fixes

Chrome Releases reports:

This update includes multiple security fixes:

  • Critical CVE-2026-5858: Heap buffer overflow in WebML.
  • Critical CVE-2026-5859: Integer overflow in WebML.
  • High CVE-2026-5860: Use after free in WebRTC.
  • High CVE-2026-5861: Use after free in V8.
  • High CVE-2026-5862: Inappropriate implementation in V8.
  • High CVE-2026-5863: Inappropriate implementation in V8.
  • High CVE-2026-5864: Heap buffer overflow in WebAudio.
  • High CVE-2026-5865: Type Confusion in V8.
  • High CVE-2026-5866: Use after free in Media.
  • High CVE-2026-5867: Heap buffer overflow in WebML.
  • High CVE-2026-5868: Heap buffer overflow in ANGLE.
  • High CVE-2026-5869: Heap buffer overflow in WebML.
  • High CVE-2026-5870: Integer overflow in Skia.
  • High CVE-2026-5871: Type Confusion in V8.
  • High CVE-2026-5872: Use after free in Blink.
  • High CVE-2026-5873: Out of bounds read and write in V8.
  • Medium CVE-2026-5874: Use after free in PrivateAI.
  • Medium CVE-2026-5875: Policy bypass in Blink.
  • Medium CVE-2026-5876: Side-channel information leakage in Navigation.
  • Medium CVE-2026-5877: Use after free in Navigation.
  • Medium CVE-2026-5878: Incorrect security UI in Blink.
  • Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE.
  • Medium CVE-2026-5880: Incorrect security UI in browser UI.
  • Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess.
  • Medium CVE-2026-5882: Incorrect security UI in Fullscreen.
  • Medium CVE-2026-5883: Use after free in Media.
  • Medium CVE-2026-5884: Insufficient validation of untrusted input in Media.
  • Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML.
  • Medium CVE-2026-5886: Out of bounds read in WebAudio.
  • Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads.
  • Medium CVE-2026-5888: Uninitialized Use in WebCodecs.
  • Medium CVE-2026-5889: Cryptographic Flaw in PDFium.
  • Medium CVE-2026-5890: Race in WebCodecs.
  • Medium CVE-2026-5891: Insufficient policy enforcement in browser UI.
  • Medium CVE-2026-5892: Insufficient policy enforcement in PWAs.
  • Medium CVE-2026-5893: Race in V8.
  • Low CVE-2026-5894: Inappropriate implementation in PDF.
  • Low CVE-2026-5895: Incorrect security UI in Omnibox.
  • Low CVE-2026-5896: Policy bypass in Audio.
  • Low CVE-2026-5897: Incorrect security UI in Downloads.
  • Low CVE-2026-5898: Incorrect security UI in Omnibox.
  • Low CVE-2026-5899: Incorrect security UI in History Navigation.
  • Low CVE-2026-5900: Policy bypass in Downloads.
  • Low CVE-2026-5901: Policy bypass in DevTools.
  • Low CVE-2026-5902: Race in Media.
  • Low CVE-2026-5903: Policy bypass in IFrameSandbox.
  • Low CVE-2026-5904: Use after free in V8.
  • Low CVE-2026-5905: Incorrect security UI in Permissions.
  • Low CVE-2026-5906: Incorrect security UI in Omnibox.
  • Low CVE-2026-5907: Insufficient data validation in Media.
  • Low CVE-2026-5908: Integer overflow in Media.
  • Low CVE-2026-5909: Integer overflow in Media.
  • Low CVE-2026-5910: Integer overflow in Media.
  • Low CVE-2026-5911: Policy bypass in ServiceWorkers.
  • Low CVE-2026-5912: Integer overflow in WebRTC.
  • Low CVE-2026-5913: Out of bounds read in Blink.
  • Low CVE-2026-5914: Type Confusion in CSS.
  • Low CVE-2026-5915: Insufficient validation of untrusted input in WebML.
  • Low CVE-2026-5918: Inappropriate implementation in Navigation.
  • Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets.

Discovery 2026-04-07
Entry 2026-04-10
chromium
< 147.0.7727.55

ungoogled-chromium
< 147.0.7727.55

CVE-2026-5858
CVE-2026-5859
CVE-2026-5860
CVE-2026-5861
CVE-2026-5862
CVE-2026-5863
CVE-2026-5864
CVE-2026-5865
CVE-2026-5866
CVE-2026-5867
CVE-2026-5868
CVE-2026-5869
CVE-2026-5870
CVE-2026-5871
CVE-2026-5872
CVE-2026-5873
CVE-2026-5874
CVE-2026-5875
CVE-2026-5876
CVE-2026-5877
CVE-2026-5878
CVE-2026-5879
CVE-2026-5880
CVE-2026-5881
CVE-2026-5882
CVE-2026-5883
CVE-2026-5884
CVE-2026-5885
CVE-2026-5886
CVE-2026-5887
CVE-2026-5888
CVE-2026-5889
CVE-2026-5890
CVE-2026-5891
CVE-2026-5892
CVE-2026-5893
CVE-2026-5894
CVE-2026-5895
CVE-2026-5896
CVE-2026-5897
CVE-2026-5898
CVE-2026-5899
CVE-2026-5900
CVE-2026-5901
CVE-2026-5902
CVE-2026-5903
CVE-2026-5904
CVE-2026-5905
CVE-2026-5906
CVE-2026-5907
CVE-2026-5908
CVE-2026-5909
CVE-2026-5910
CVE-2026-5911
CVE-2026-5912
CVE-2026-5913
CVE-2026-5914
CVE-2026-5915
CVE-2026-5918
CVE-2026-5919
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html