From nobody Fri Apr 10 07:02:06 2026 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4fsSR7385Vz6Y9b9 for ; Fri, 10 Apr 2026 07:02:11 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R12" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4fsSR72VBtz3WSC for ; Fri, 10 Apr 2026 07:02:11 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1775804531; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=VUktvEM+l1Fna4Syemrup6AoaiY6q6k9aPi9qphhYko=; b=CCAzDzLpmZgosjokP9dyr5EvcjW4SX0dxyhT5dSaWMtuanPkGgFUeIh3is7Y7zOKsizZOl aW9DFotgj1uDUHKXCs/HTnQBDoKVHBvphEKGHLuji919et/gT8685GFb2z1CopUwZe4T7E 0Kdq+gQUZnOivldIsRGpoAczPmLoN93zLcpAGDl6NWF2xGXmjhEAQ9wTdw8HrSwES2fiLZ EyB683QwJrofJeegciOZLc1LflFod4hw4x0VvThQb74h6dQgXwsORTLNK2SZXRX+iVe86p iW6QxhK60LX5a3pNUk8MjAWDrf4xt7r5Qzx74jxC8P+rA5lt57CLdKfZhqu8bA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1775804531; a=rsa-sha256; cv=none; b=t8celQqXnSglzf18TB5e0io+oBOPqYONbguqSdtM8w7Drv2+OACDXFSssP9OoCbXpgRw9N OatujEHotiMp4/cnZ/jCMpMHCJ3R7sQSGk8nPAjIOpYUhpLlcaf4Tnydkt88kelt906c12 9EF0eqEv0wnvtAd/wjj21Z64/aS8bek+eiPOJiHKj1wvG8/ipDBvID9HBd+hqhwuKIvAaV GXYUw8SCF8KZf5qc76m/lXAACQr5HitV6m8DxdMJ4hv6BBBiZWzAMxsh6dXD0+8G1aJ1LJ qR+CaGr72ZbImMSM84RcYAa744isQeHnaVF1wnOgeuAoRkgMgqhblIYBO5zQhw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1775804531; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=VUktvEM+l1Fna4Syemrup6AoaiY6q6k9aPi9qphhYko=; b=pnups5M7hbHVra1bB+Y5xBBHe68Ty5TkJkp0sLhkLzmH+9bkUdYQMQb4OF45F0386HoOXC C9EXXOSPliv32BESrtaC85Wbza9ECRyxjDHNV7oQSWlmkDrs7s/irSX+LhudEbSaM4rerd CrSgSNPWpNcx0c0gv93HkaJ4SkoNjBnLK3pPcIHDEZ5tGJUw2Krd0LPt0zP/e0QBw6UEIs wdyPm1wqj4vR3YlDZ7ZP03LWhVS8KqYqbr7CKzeQoIzCcyAdk+xvtQxYDH/POh2e3om/ZA A1va59zvKk6WdI9LjW4YsKZz492+qqMsuAHiLFJblzZMsw/kSeSAhf9Arkim3A== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) by mxrelay.nyi.freebsd.org (Postfix) with ESMTP id 4fsSR723CfzZTY for ; Fri, 10 Apr 2026 07:02:11 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from git (uid 1279) (envelope-from git@FreeBSD.org) id 39102 by gitrepo.freebsd.org (DragonFly Mail Agent v0.13+ on gitrepo.freebsd.org); Fri, 10 Apr 2026 07:02:06 +0000 To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Robert Nagy Subject: git: b37836a814e0 - main - security/vuxml: add www/*chromium < 147.0.7727.55 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rnagy X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: b37836a814e0de25a297e6b0618f1e68b308e1e0 Auto-Submitted: auto-generated Date: Fri, 10 Apr 2026 07:02:06 +0000 Message-Id: <69d8a06e.39102.77ffa0a1@gitrepo.freebsd.org> The branch main has been updated by rnagy: URL: https://cgit.FreeBSD.org/ports/commit/?id=b37836a814e0de25a297e6b0618f1e68b308e1e0 commit b37836a814e0de25a297e6b0618f1e68b308e1e0 Author: Robert Nagy AuthorDate: 2026-04-10 07:01:33 +0000 Commit: Robert Nagy CommitDate: 2026-04-10 07:01:33 +0000 security/vuxml: add www/*chromium < 147.0.7727.55 Obtained from: https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html --- security/vuxml/vuln/2026.xml | 151 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 151 insertions(+) diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml index aeaeeb40c5e8..85c1c149bcc4 100644 --- a/security/vuxml/vuln/2026.xml +++ b/security/vuxml/vuln/2026.xml @@ -1,3 +1,154 @@ + + chromium -- security fixes + + + chromium + 147.0.7727.55 + + + ungoogled-chromium + 147.0.7727.55 + + + + +

Chrome Releases reports:

+
+

This update includes multiple security fixes:

+
    +
  • Critical CVE-2026-5858: Heap buffer overflow in WebML.
  • +
  • Critical CVE-2026-5859: Integer overflow in WebML.
  • +
  • High CVE-2026-5860: Use after free in WebRTC.
  • +
  • High CVE-2026-5861: Use after free in V8.
  • +
  • High CVE-2026-5862: Inappropriate implementation in V8.
  • +
  • High CVE-2026-5863: Inappropriate implementation in V8.
  • +
  • High CVE-2026-5864: Heap buffer overflow in WebAudio.
  • +
  • High CVE-2026-5865: Type Confusion in V8.
  • +
  • High CVE-2026-5866: Use after free in Media.
  • +
  • High CVE-2026-5867: Heap buffer overflow in WebML.
  • +
  • High CVE-2026-5868: Heap buffer overflow in ANGLE.
  • +
  • High CVE-2026-5869: Heap buffer overflow in WebML.
  • +
  • High CVE-2026-5870: Integer overflow in Skia.
  • +
  • High CVE-2026-5871: Type Confusion in V8.
  • +
  • High CVE-2026-5872: Use after free in Blink.
  • +
  • High CVE-2026-5873: Out of bounds read and write in V8.
  • +
  • Medium CVE-2026-5874: Use after free in PrivateAI.
  • +
  • Medium CVE-2026-5875: Policy bypass in Blink.
  • +
  • Medium CVE-2026-5876: Side-channel information leakage in Navigation.
  • +
  • Medium CVE-2026-5877: Use after free in Navigation.
  • +
  • Medium CVE-2026-5878: Incorrect security UI in Blink.
  • +
  • Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE.
  • +
  • Medium CVE-2026-5880: Incorrect security UI in browser UI.
  • +
  • Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess.
  • +
  • Medium CVE-2026-5882: Incorrect security UI in Fullscreen.
  • +
  • Medium CVE-2026-5883: Use after free in Media.
  • +
  • Medium CVE-2026-5884: Insufficient validation of untrusted input in Media.
  • +
  • Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML.
  • +
  • Medium CVE-2026-5886: Out of bounds read in WebAudio.
  • +
  • Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads.
  • +
  • Medium CVE-2026-5888: Uninitialized Use in WebCodecs.
  • +
  • Medium CVE-2026-5889: Cryptographic Flaw in PDFium.
  • +
  • Medium CVE-2026-5890: Race in WebCodecs.
  • +
  • Medium CVE-2026-5891: Insufficient policy enforcement in browser UI.
  • +
  • Medium CVE-2026-5892: Insufficient policy enforcement in PWAs.
  • +
  • Medium CVE-2026-5893: Race in V8.
  • +
  • Low CVE-2026-5894: Inappropriate implementation in PDF.
  • +
  • Low CVE-2026-5895: Incorrect security UI in Omnibox.
  • +
  • Low CVE-2026-5896: Policy bypass in Audio.
  • +
  • Low CVE-2026-5897: Incorrect security UI in Downloads.
  • +
  • Low CVE-2026-5898: Incorrect security UI in Omnibox.
  • +
  • Low CVE-2026-5899: Incorrect security UI in History Navigation.
  • +
  • Low CVE-2026-5900: Policy bypass in Downloads.
  • +
  • Low CVE-2026-5901: Policy bypass in DevTools.
  • +
  • Low CVE-2026-5902: Race in Media.
  • +
  • Low CVE-2026-5903: Policy bypass in IFrameSandbox.
  • +
  • Low CVE-2026-5904: Use after free in V8.
  • +
  • Low CVE-2026-5905: Incorrect security UI in Permissions.
  • +
  • Low CVE-2026-5906: Incorrect security UI in Omnibox.
  • +
  • Low CVE-2026-5907: Insufficient data validation in Media.
  • +
  • Low CVE-2026-5908: Integer overflow in Media.
  • +
  • Low CVE-2026-5909: Integer overflow in Media.
  • +
  • Low CVE-2026-5910: Integer overflow in Media.
  • +
  • Low CVE-2026-5911: Policy bypass in ServiceWorkers.
  • +
  • Low CVE-2026-5912: Integer overflow in WebRTC.
  • +
  • Low CVE-2026-5913: Out of bounds read in Blink.
  • +
  • Low CVE-2026-5914: Type Confusion in CSS.
  • +
  • Low CVE-2026-5915: Insufficient validation of untrusted input in WebML.
  • +
  • Low CVE-2026-5918: Inappropriate implementation in Navigation.
  • +
  • Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets.
  • +
+
+ +
+ + CVE-2026-5858 + CVE-2026-5859 + CVE-2026-5860 + CVE-2026-5861 + CVE-2026-5862 + CVE-2026-5863 + CVE-2026-5864 + CVE-2026-5865 + CVE-2026-5866 + CVE-2026-5867 + CVE-2026-5868 + CVE-2026-5869 + CVE-2026-5870 + CVE-2026-5871 + CVE-2026-5872 + CVE-2026-5873 + CVE-2026-5874 + CVE-2026-5875 + CVE-2026-5876 + CVE-2026-5877 + CVE-2026-5878 + CVE-2026-5879 + CVE-2026-5880 + CVE-2026-5881 + CVE-2026-5882 + CVE-2026-5883 + CVE-2026-5884 + CVE-2026-5885 + CVE-2026-5886 + CVE-2026-5887 + CVE-2026-5888 + CVE-2026-5889 + CVE-2026-5890 + CVE-2026-5891 + CVE-2026-5892 + CVE-2026-5893 + CVE-2026-5894 + CVE-2026-5895 + CVE-2026-5896 + CVE-2026-5897 + CVE-2026-5898 + CVE-2026-5899 + CVE-2026-5900 + CVE-2026-5901 + CVE-2026-5902 + CVE-2026-5903 + CVE-2026-5904 + CVE-2026-5905 + CVE-2026-5906 + CVE-2026-5907 + CVE-2026-5908 + CVE-2026-5909 + CVE-2026-5910 + CVE-2026-5911 + CVE-2026-5912 + CVE-2026-5913 + CVE-2026-5914 + CVE-2026-5915 + CVE-2026-5918 + CVE-2026-5919 + https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html + + + 2026-04-07 + 2026-04-10 + +
+ Mozilla -- Memory safety bugs