Re: And then there was one (browser)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Wed, Feb 5, 2014 at 12:30 AM, Robert Arkiletian <robark@xxxxxxxxx> wrote:

> new potential remote code exploit in Chromium flash.
> http://googlechromereleases.blogspot.ca/2014/02/stable-channel-update.html
>
> Doesn't look like these repos are being updated.
> http://people.redhat.com/tpopela/rpms/
> http://people.centos.org/hughesjr/chromium/6/
>
> Any info on this issue would be welcome.
>


Yes, please. Can the CentOS folks check with their newly minted Red Hat
brethren on this issue?

This is getting critical for us. We have over a hundred CO6 desktops that
are currently running an insecure version of chromium. The security people
are all over us on this!

We need to run chrome/chromium in order to manage our Google Apps for
Government deployment (for over 1000 users). It doesn't work right with
firefox.

If we need to apply pressure elsewhere, please let us know where to direct
our fury.

-- 
Matt Phelps
System Administrator, Computation Facility
Harvard - Smithsonian Center for Astrophysics
mphelps@xxxxxxxxxxxxxxx, http://www.cfa.harvard.edu
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux