Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Aug 2012 18:02:11 -0700
From:      Eitan Adler <eadler@freebsd.org>
To:        Rene Ladan <rene@freebsd.org>
Cc:        svn-ports-head@freebsd.org, George Liaskos <geo.liaskos@gmail.com>, svn-ports-all@freebsd.org, ports-committers@freebsd.org
Subject:   Re: svn commit: r302390 - head/security/vuxml
Message-ID:  <CAF6rxgk2x7cyL_uX1_PkVLioqrLjJ%2Bt5a9DQEJVG_gzQpou7tg@mail.gmail.com>
In-Reply-To: <5026BDA9.8090107@freebsd.org>
References:  <201208101438.q7AEclPw044254@svn.freebsd.org> <CAF6rxgk%2Bbe1o_b8Z4zTAXRDcesKEh9iFp0oc1DbqHSio6LMOZg@mail.gmail.com> <5026BDA9.8090107@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 11 August 2012 13:16, Rene Ladan <rene@freebsd.org> wrote:
> On 11-08-2012 19:06, Eitan Adler wrote:
>> On 10 August 2012 07:38, Rene Ladan <rene@freebsd.org> wrote:
>>> +       <p>Google Chrome Releases reports:</p>
>>> +       <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates">;
>>> +         <p>[Linux only] [125225] Medium CVE-2012-2846: Cross-process
>>> +           interference in renderers. Credit to Google Chrome Security Team
>>> +           (Julien Tinnes).</p>
>>
>> Does this affect us?
>>
> Honestly I don't know, I usually only remove Windows-only vulnerabilities.

Thanks. I'm not sure how upstream label's their vulns :)


-- 
Eitan Adler
Source & Ports committer
X11, Bugbusting teams



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAF6rxgk2x7cyL_uX1_PkVLioqrLjJ%2Bt5a9DQEJVG_gzQpou7tg>