CVE-2022-26485: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. CVE-2022-26486: An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw.
Please stabilize ASAP, if we're able.
Cleaned. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=0923adb720b30967b3bbcbf1624dd8d4b0ab1e37