FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2026-04-11 19:25:37 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
These are the vulnerabilities relating to the commit you have selected:
| VuXML ID | Description |
| 4b727a1a-5034-42b4-b29b-2289389f4ba8 | chromium -- security fixes
Chrome Releases reports:
This update includes multiple security fixes:
- Critical CVE-2026-5858: Heap buffer overflow in WebML.
- Critical CVE-2026-5859: Integer overflow in WebML.
- High CVE-2026-5860: Use after free in WebRTC.
- High CVE-2026-5861: Use after free in V8.
- High CVE-2026-5862: Inappropriate implementation in V8.
- High CVE-2026-5863: Inappropriate implementation in V8.
- High CVE-2026-5864: Heap buffer overflow in WebAudio.
- High CVE-2026-5865: Type Confusion in V8.
- High CVE-2026-5866: Use after free in Media.
- High CVE-2026-5867: Heap buffer overflow in WebML.
- High CVE-2026-5868: Heap buffer overflow in ANGLE.
- High CVE-2026-5869: Heap buffer overflow in WebML.
- High CVE-2026-5870: Integer overflow in Skia.
- High CVE-2026-5871: Type Confusion in V8.
- High CVE-2026-5872: Use after free in Blink.
- High CVE-2026-5873: Out of bounds read and write in V8.
- Medium CVE-2026-5874: Use after free in PrivateAI.
- Medium CVE-2026-5875: Policy bypass in Blink.
- Medium CVE-2026-5876: Side-channel information leakage in Navigation.
- Medium CVE-2026-5877: Use after free in Navigation.
- Medium CVE-2026-5878: Incorrect security UI in Blink.
- Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE.
- Medium CVE-2026-5880: Incorrect security UI in browser UI.
- Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess.
- Medium CVE-2026-5882: Incorrect security UI in Fullscreen.
- Medium CVE-2026-5883: Use after free in Media.
- Medium CVE-2026-5884: Insufficient validation of untrusted input in Media.
- Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML.
- Medium CVE-2026-5886: Out of bounds read in WebAudio.
- Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads.
- Medium CVE-2026-5888: Uninitialized Use in WebCodecs.
- Medium CVE-2026-5889: Cryptographic Flaw in PDFium.
- Medium CVE-2026-5890: Race in WebCodecs.
- Medium CVE-2026-5891: Insufficient policy enforcement in browser UI.
- Medium CVE-2026-5892: Insufficient policy enforcement in PWAs.
- Medium CVE-2026-5893: Race in V8.
- Low CVE-2026-5894: Inappropriate implementation in PDF.
- Low CVE-2026-5895: Incorrect security UI in Omnibox.
- Low CVE-2026-5896: Policy bypass in Audio.
- Low CVE-2026-5897: Incorrect security UI in Downloads.
- Low CVE-2026-5898: Incorrect security UI in Omnibox.
- Low CVE-2026-5899: Incorrect security UI in History Navigation.
- Low CVE-2026-5900: Policy bypass in Downloads.
- Low CVE-2026-5901: Policy bypass in DevTools.
- Low CVE-2026-5902: Race in Media.
- Low CVE-2026-5903: Policy bypass in IFrameSandbox.
- Low CVE-2026-5904: Use after free in V8.
- Low CVE-2026-5905: Incorrect security UI in Permissions.
- Low CVE-2026-5906: Incorrect security UI in Omnibox.
- Low CVE-2026-5907: Insufficient data validation in Media.
- Low CVE-2026-5908: Integer overflow in Media.
- Low CVE-2026-5909: Integer overflow in Media.
- Low CVE-2026-5910: Integer overflow in Media.
- Low CVE-2026-5911: Policy bypass in ServiceWorkers.
- Low CVE-2026-5912: Integer overflow in WebRTC.
- Low CVE-2026-5913: Out of bounds read in Blink.
- Low CVE-2026-5914: Type Confusion in CSS.
- Low CVE-2026-5915: Insufficient validation of untrusted input in WebML.
- Low CVE-2026-5918: Inappropriate implementation in Navigation.
- Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets.
Discovery 2026-04-07 Entry 2026-04-10 chromium
< 147.0.7727.55
ungoogled-chromium
< 147.0.7727.55
CVE-2026-5858
CVE-2026-5859
CVE-2026-5860
CVE-2026-5861
CVE-2026-5862
CVE-2026-5863
CVE-2026-5864
CVE-2026-5865
CVE-2026-5866
CVE-2026-5867
CVE-2026-5868
CVE-2026-5869
CVE-2026-5870
CVE-2026-5871
CVE-2026-5872
CVE-2026-5873
CVE-2026-5874
CVE-2026-5875
CVE-2026-5876
CVE-2026-5877
CVE-2026-5878
CVE-2026-5879
CVE-2026-5880
CVE-2026-5881
CVE-2026-5882
CVE-2026-5883
CVE-2026-5884
CVE-2026-5885
CVE-2026-5886
CVE-2026-5887
CVE-2026-5888
CVE-2026-5889
CVE-2026-5890
CVE-2026-5891
CVE-2026-5892
CVE-2026-5893
CVE-2026-5894
CVE-2026-5895
CVE-2026-5896
CVE-2026-5897
CVE-2026-5898
CVE-2026-5899
CVE-2026-5900
CVE-2026-5901
CVE-2026-5902
CVE-2026-5903
CVE-2026-5904
CVE-2026-5905
CVE-2026-5906
CVE-2026-5907
CVE-2026-5908
CVE-2026-5909
CVE-2026-5910
CVE-2026-5911
CVE-2026-5912
CVE-2026-5913
CVE-2026-5914
CVE-2026-5915
CVE-2026-5918
CVE-2026-5919
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html
|