Date: Mon, 13 Aug 2012 18:02:11 -0700 From: Eitan Adler <eadler@freebsd.org> To: Rene Ladan <rene@freebsd.org> Cc: svn-ports-head@freebsd.org, George Liaskos <geo.liaskos@gmail.com>, svn-ports-all@freebsd.org, ports-committers@freebsd.org Subject: Re: svn commit: r302390 - head/security/vuxml Message-ID: <CAF6rxgk2x7cyL_uX1_PkVLioqrLjJ%2Bt5a9DQEJVG_gzQpou7tg@mail.gmail.com> In-Reply-To: <5026BDA9.8090107@freebsd.org> References: <201208101438.q7AEclPw044254@svn.freebsd.org> <CAF6rxgk%2Bbe1o_b8Z4zTAXRDcesKEh9iFp0oc1DbqHSio6LMOZg@mail.gmail.com> <5026BDA9.8090107@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 11 August 2012 13:16, Rene Ladan <rene@freebsd.org> wrote: > On 11-08-2012 19:06, Eitan Adler wrote: >> On 10 August 2012 07:38, Rene Ladan <rene@freebsd.org> wrote: >>> + <p>Google Chrome Releases reports:</p> >>> + <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates"> >>> + <p>[Linux only] [125225] Medium CVE-2012-2846: Cross-process >>> + interference in renderers. Credit to Google Chrome Security Team >>> + (Julien Tinnes).</p> >> >> Does this affect us? >> > Honestly I don't know, I usually only remove Windows-only vulnerabilities. Thanks. I'm not sure how upstream label's their vulns :) -- Eitan Adler Source & Ports committer X11, Bugbusting teams
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAF6rxgk2x7cyL_uX1_PkVLioqrLjJ%2Bt5a9DQEJVG_gzQpou7tg>