FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2026-04-11 19:25:37 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
4b727a1a-5034-42b4-b29b-2289389f4ba8chromium -- security fixes

Chrome Releases reports:

This update includes multiple security fixes:

  • Critical CVE-2026-5858: Heap buffer overflow in WebML.
  • Critical CVE-2026-5859: Integer overflow in WebML.
  • High CVE-2026-5860: Use after free in WebRTC.
  • High CVE-2026-5861: Use after free in V8.
  • High CVE-2026-5862: Inappropriate implementation in V8.
  • High CVE-2026-5863: Inappropriate implementation in V8.
  • High CVE-2026-5864: Heap buffer overflow in WebAudio.
  • High CVE-2026-5865: Type Confusion in V8.
  • High CVE-2026-5866: Use after free in Media.
  • High CVE-2026-5867: Heap buffer overflow in WebML.
  • High CVE-2026-5868: Heap buffer overflow in ANGLE.
  • High CVE-2026-5869: Heap buffer overflow in WebML.
  • High CVE-2026-5870: Integer overflow in Skia.
  • High CVE-2026-5871: Type Confusion in V8.
  • High CVE-2026-5872: Use after free in Blink.
  • High CVE-2026-5873: Out of bounds read and write in V8.
  • Medium CVE-2026-5874: Use after free in PrivateAI.
  • Medium CVE-2026-5875: Policy bypass in Blink.
  • Medium CVE-2026-5876: Side-channel information leakage in Navigation.
  • Medium CVE-2026-5877: Use after free in Navigation.
  • Medium CVE-2026-5878: Incorrect security UI in Blink.
  • Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE.
  • Medium CVE-2026-5880: Incorrect security UI in browser UI.
  • Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess.
  • Medium CVE-2026-5882: Incorrect security UI in Fullscreen.
  • Medium CVE-2026-5883: Use after free in Media.
  • Medium CVE-2026-5884: Insufficient validation of untrusted input in Media.
  • Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML.
  • Medium CVE-2026-5886: Out of bounds read in WebAudio.
  • Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads.
  • Medium CVE-2026-5888: Uninitialized Use in WebCodecs.
  • Medium CVE-2026-5889: Cryptographic Flaw in PDFium.
  • Medium CVE-2026-5890: Race in WebCodecs.
  • Medium CVE-2026-5891: Insufficient policy enforcement in browser UI.
  • Medium CVE-2026-5892: Insufficient policy enforcement in PWAs.
  • Medium CVE-2026-5893: Race in V8.
  • Low CVE-2026-5894: Inappropriate implementation in PDF.
  • Low CVE-2026-5895: Incorrect security UI in Omnibox.
  • Low CVE-2026-5896: Policy bypass in Audio.
  • Low CVE-2026-5897: Incorrect security UI in Downloads.
  • Low CVE-2026-5898: Incorrect security UI in Omnibox.
  • Low CVE-2026-5899: Incorrect security UI in History Navigation.
  • Low CVE-2026-5900: Policy bypass in Downloads.
  • Low CVE-2026-5901: Policy bypass in DevTools.
  • Low CVE-2026-5902: Race in Media.
  • Low CVE-2026-5903: Policy bypass in IFrameSandbox.
  • Low CVE-2026-5904: Use after free in V8.
  • Low CVE-2026-5905: Incorrect security UI in Permissions.
  • Low CVE-2026-5906: Incorrect security UI in Omnibox.
  • Low CVE-2026-5907: Insufficient data validation in Media.
  • Low CVE-2026-5908: Integer overflow in Media.
  • Low CVE-2026-5909: Integer overflow in Media.
  • Low CVE-2026-5910: Integer overflow in Media.
  • Low CVE-2026-5911: Policy bypass in ServiceWorkers.
  • Low CVE-2026-5912: Integer overflow in WebRTC.
  • Low CVE-2026-5913: Out of bounds read in Blink.
  • Low CVE-2026-5914: Type Confusion in CSS.
  • Low CVE-2026-5915: Insufficient validation of untrusted input in WebML.
  • Low CVE-2026-5918: Inappropriate implementation in Navigation.
  • Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets.

Discovery 2026-04-07
Entry 2026-04-10
chromium
< 147.0.7727.55

ungoogled-chromium
< 147.0.7727.55

CVE-2026-5858
CVE-2026-5859
CVE-2026-5860
CVE-2026-5861
CVE-2026-5862
CVE-2026-5863
CVE-2026-5864
CVE-2026-5865
CVE-2026-5866
CVE-2026-5867
CVE-2026-5868
CVE-2026-5869
CVE-2026-5870
CVE-2026-5871
CVE-2026-5872
CVE-2026-5873
CVE-2026-5874
CVE-2026-5875
CVE-2026-5876
CVE-2026-5877
CVE-2026-5878
CVE-2026-5879
CVE-2026-5880
CVE-2026-5881
CVE-2026-5882
CVE-2026-5883
CVE-2026-5884
CVE-2026-5885
CVE-2026-5886
CVE-2026-5887
CVE-2026-5888
CVE-2026-5889
CVE-2026-5890
CVE-2026-5891
CVE-2026-5892
CVE-2026-5893
CVE-2026-5894
CVE-2026-5895
CVE-2026-5896
CVE-2026-5897
CVE-2026-5898
CVE-2026-5899
CVE-2026-5900
CVE-2026-5901
CVE-2026-5902
CVE-2026-5903
CVE-2026-5904
CVE-2026-5905
CVE-2026-5906
CVE-2026-5907
CVE-2026-5908
CVE-2026-5909
CVE-2026-5910
CVE-2026-5911
CVE-2026-5912
CVE-2026-5913
CVE-2026-5914
CVE-2026-5915
CVE-2026-5918
CVE-2026-5919
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html