<Vulnerability name="CVE-2026-7940">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-05-05T00:00:00</PublicDate>
    <Bugzilla id="2467417" url="https://bugzilla.redhat.com/show_bug.cgi?id=2467417" xml:lang="en:us">
chromium-browser: Use after free in V8
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>6.7</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-825</CWE>
    <Details xml:lang="en:us" source="Red Hat">
An use after free flaw was found in the V8 component of the Chromium browser.

Upstream bug(s):

https://code.google.com/p/chromium/issues/detail?id=493631402
    </Details>
    <Statement xml:lang="en:us">
Red Hat Product Security rates the severity of this flaw as determined by the Google Chrome Security Advisory.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-7940
https://nvd.nist.gov/vuln/detail/CVE-2026-7940
https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop.html
https://issues.chromium.org/issues/493631402
    </References>
</Vulnerability>