From owner-freebsd-chromium@FreeBSD.ORG Thu Jan 16 14:45:07 2014 Return-Path: Delivered-To: freebsd-chromium@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id DBEB1817; Thu, 16 Jan 2014 14:45:06 +0000 (UTC) Received: from mail-la0-x235.google.com (mail-la0-x235.google.com [IPv6:2a00:1450:4010:c03::235]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 36A4C1378; Thu, 16 Jan 2014 14:45:06 +0000 (UTC) Received: by mail-la0-f53.google.com with SMTP id e16so2635146lan.12 for ; Thu, 16 Jan 2014 06:45:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=dQ7qyjt+fE7VKkBVLDHcAF+IsE9u3sUVK7G8YNx/YQw=; b=qNefhFcnM+kKaObBnsr1pnkZEk9+XX6Yo1PZtqUD2PfUnCCpkvchYpPI7PBwqBWfgd xbFMlArRgdieioy6F54xCuBzPczyEl8Jvfr/jh3S1cnJBGTDQqDTr/BpevJdhbLXUUu9 4L/cjEb5ueikNULB7FfVjWxQjpIcAvF9yTcL0opBzM3fguKN8mRSYesN0wZmcJFAwM3Z EV6sX6d2q1egz17uXqvXgViH6b7GNoPd9Dfwg39z1RGHnXEczVaPtchCJNjax5HqF+tg tke/YGYtdWgQe4IMdL5th2luvc8Ikq5KN26pL4ZFgF0hCdAwx5ZRGASKdfPcqPFJ3Koo PJvg== MIME-Version: 1.0 X-Received: by 10.152.44.167 with SMTP id f7mr480949lam.64.1389883503396; Thu, 16 Jan 2014 06:45:03 -0800 (PST) Received: by 10.112.51.101 with HTTP; Thu, 16 Jan 2014 06:45:03 -0800 (PST) In-Reply-To: References: Date: Thu, 16 Jan 2014 15:45:03 +0100 Message-ID: Subject: Re: 32.0.1700.77 released From: Carlos Jacobo Puga Medina To: =?ISO-8859-1?Q?Ren=E9_Ladan?= , freebsd-chromium@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 X-Content-Filtered-By: Mailman/MimeDel 2.1.17 X-BeenThere: freebsd-chromium@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: FreeBSD-specific Chromium issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 16 Jan 2014 14:45:07 -0000 I installed it by passing the DDISABLE_VULNERABILITIES option, but I can confirm that the new chrome released doesn't work as expected. It crashes over and over again e.g. when I check the chrome version/plugins/chrome info (just typing 'chrome://command' in the address bar). I deleted the $HOME/.config/chromium directory, but no change in behaviour. So I will return to previous version. Regards, --CJPM 2014/1/16 Carlos Jacobo Puga Medina > When upgrading chromium port shows that it has multiple vulnerabilities. > > ===> chromium-32.0.1700.72 has known vulnerabilities: > Affected package: chromium-32.0.1700.72 > Type of problem: chromium -- multiple vulnerabilities. > Reference: > http://portaudit.FreeBSD.org/5acf4638-7e2c-11e3-9fba-00262d5ed8ee.html > => Please update your ports tree and try again. > *** [check-vulnerable] Error code 1 > > Stop in /usr/ports/www/chromium. > *** [build] Error code 1 > > Stop in /usr/ports/www/chromium. > > ===>>> make failed for www/chromium > ===>>> Aborting update > > > >