From owner-freebsd-chromium@freebsd.org Sun Oct 11 18:00:33 2015 Return-Path: Delivered-To: freebsd-chromium@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9425CA11712 for ; Sun, 11 Oct 2015 18:00:33 +0000 (UTC) (envelope-from moxalt@riseup.net) Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.riseup.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 787CC1E90 for ; Sun, 11 Oct 2015 18:00:33 +0000 (UTC) (envelope-from moxalt@riseup.net) Received: from cotinga.riseup.net (unknown [10.0.1.161]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.riseup.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.riseup.net (Postfix) with ESMTPS id 9B97EC1399 for ; Sun, 11 Oct 2015 11:00:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak; t=1444586426; bh=zgZYDHO1rWegVYohFjMDyZyfdwBMgFPAxWpUAMDT0SU=; h=Date:From:To:Subject:In-Reply-To:References:From; b=babWgsBEiDcHyZsOZGv1oJn8TG7ucLTH2TZLAxtG8hUByEZm9mhVi/5v0A4pXlLev TR6qO+HOqqakMSQjEvKNj1wEyhAIvJJBTarBKKMm+eZpqmmhNskvbRM8jdFDTcx5W8 jJwutJXVg7HAT/bidmJ9tecTfMJ8pNwGqSbY3Aog= Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: moxalt) with ESMTPSA id 7DAB01C01F2 Date: Sun, 11 Oct 2015 21:00:21 +0300 From: moxalt To: freebsd-chromium@freebsd.org Subject: Re: Odd infrequent crashes on chromium with Javascript? Message-ID: <20151011210021.5af1b93c@multivac> In-Reply-To: <20151010211246.GC78146@egr.msu.edu> References: <20151010211246.GC78146@egr.msu.edu> Organization: Debian Project X-Mailer: Claws Mail 3.12.0 (GTK+ 2.24.28; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Virus-Scanned: clamav-milter 0.98.7 at mx1.riseup.net X-Virus-Status: Clean X-BeenThere: freebsd-chromium@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: FreeBSD-specific Chromium issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 18:00:33 -0000 I can confirm this has happened to me. Once. Chromium unexpectedly crashed on accessing http://trisquel.info/. I have no idea whether this is JavaScript-related. Never happened again. Interestingly enough, I don't think this behaviour is confined to FreeBSD, let alone 10-STABLE. Similar behaviour happens on my Debian box running Stretch. I would place the issue upstream. Firefox never crashes, but at least Chromium doesn't take minutes to load JavaScript-heavy pages. I can put up with a crash every now and then. From owner-freebsd-chromium@freebsd.org Wed Oct 14 12:55:15 2015 Return-Path: Delivered-To: freebsd-chromium@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AAE2BA11D32 for ; Wed, 14 Oct 2015 12:55:15 +0000 (UTC) (envelope-from cpm@fbsd.es) Received: from imap11-3.ox.privateemail.com (imap11-3.ox.privateemail.com [198.187.29.245]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "privateemail.com", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 7E84212A6; Wed, 14 Oct 2015 12:55:15 +0000 (UTC) (envelope-from cpm@fbsd.es) Received: from localhost (localhost [127.0.0.1]) by imap11.ox.privateemail.com (Postfix) with ESMTP id E4C80880100; Wed, 14 Oct 2015 08:55:07 -0400 (EDT) X-Virus-Scanned: Debian amavisd-new at imap11.ox.privateemail.com Received: from imap11.ox.privateemail.com ([127.0.0.1]) by localhost (imap11.ox.privateemail.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id u5tBu6Onlp4m; Wed, 14 Oct 2015 08:55:07 -0400 (EDT) Received: from [192.168.0.154] (unknown [77.229.99.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by imap11.ox.privateemail.com (Postfix) with ESMTPSA id 075218800FE; Wed, 14 Oct 2015 08:55:04 -0400 (EDT) Message-ID: <1444827286.41374.5.camel@fbsd.es> Subject: Document new vulnerabilities in www/chromium < 46.0.2490.71 From: Carlos J Puga Medina To: rene Cc: freebsd-chromium@freebsd.org Date: Wed, 14 Oct 2015 14:54:46 +0200 Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="=-SEemib5YwZA2veu0seDX" X-Mailer: Evolution 3.16.5 FreeBSD GNOME Team Port Mime-Version: 1.0 X-BeenThere: freebsd-chromium@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: FreeBSD-specific Chromium issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Oct 2015 12:55:15 -0000 --=-SEemib5YwZA2veu0seDX Content-Type: multipart/mixed; boundary="=-34GOzjwdB2ZFC4XNoZsN" --=-34GOzjwdB2ZFC4XNoZsN Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Current www/chromium is marked as vulnerable on Google Chrome website[0]. # diff -urN vuln.xml.orig vuln.xml --- vuln.xml.orig 2015-10-14 14:22:59.089754000 +0200 +++ vuln.xml 2015-10-14 14:50:00.348593000 +0200 @@ -58,6 +58,60 @@ =20 --> ; + + chromium -- multiple vulnerabilities + + + chromium + 46.0.2490.71 + + + + ; +

Google Chrome Releases reports:

+
; +

24 security fixes in this release, including:

+
    +
  • [519558] High CVE-2015-6755: Cross-origin bypass in Blink. Credit + to Mariusz Mlynski.
  • +
  • [507316] High CVE-2015-6756: User-after-free in PDFium. Credit + to anonymous.
  • +
  • [529520] High CVE-2015-6757: User-after-free in ServiceWorker. Credit + to Collin Payne.
  • +
  • [522131] High CVE-2015-6758: Bad-cast in PDFium. Credit + to Atte Kettunen of OUSPG.
  • +
  • [514076] Medium CVE-2015-6759: Information leakage in LocalStorage. Credit + to Muneaki Nishimura (nishimunea).
  • +
  • [519642] Medium CVE-2015-6760: Improper error handling in libANGLE. Credit + to lastland.net.
  • +
  • [447860][532967] Medium CVE-2015-6761: Memory corruption in FFMpeg. Credit + to Aki Helin of OUSPG and anonymous.
  • +
  • [512678] Low CVE-2015-6762: CORS bypass via CSS fonts. Credit + to Muneaki Nishimura (nishimunea).
  • +
  • [542517] CVE-2015-6763: Various fixes from internal audits, + fuzzing and other initiatives.
  • +
+
+ +
+ + CVE-2015-6755 + CVE-2015-6756 + CVE-2015-6757 + CVE-2015-6758 + CVE-2015-6759 + CVE-2015-6760 + CVE-2015-6761 + CVE-2015-6762 + CVE-2015-6763=20 + http://googlechromereleases.blogspot.nl; + + + 2015-10-13 + 2015-10-14 + +
+ chromium -- multiple vulnerabilities =20 [0] http://googlechromereleases.blogspot.nl/2015/09/stable-channel-upda te.html --=20 Carlos Jacobo Puga Medina PGP fingerprint =3D C60E 9497 5302 793B CC2D BB89 A1F3 5D66 E6D0 5453 --=-34GOzjwdB2ZFC4XNoZsN Content-Disposition: attachment; filename="vuln.diff" Content-Transfer-Encoding: base64 Content-Type: text/x-patch; name="vuln.diff"; charset="UTF-8" LS0tIHZ1bG4ueG1sLm9yaWcJMjAxNS0xMC0xNCAxNDoyMjo1OS4wODk3NTQwMDAgKzAyMDAKKysr IHZ1bG4ueG1sCTIwMTUtMTAtMTQgMTQ6NTA6MDAuMzQ4NTkzMDAwICswMjAwCkBAIC01OCw2ICs1 OCw2MCBAQAogCiAtLT4KIDx2dXhtbCB4bWxucz0iaHR0cDovL3d3dy52dXhtbC5vcmcvYXBwcy92 dXhtbC0xIj4KKyAgPHZ1bG4gdmlkPSI2ZmEyMWQzZC03MjZlLTExZTUtYjc2MS1lOGUwYjc0N2E0 NWEiPgorICAgIDx0b3BpYz5jaHJvbWl1bSAtLSBtdWx0aXBsZSB2dWxuZXJhYmlsaXRpZXM8L3Rv cGljPgorICAgIDxhZmZlY3RzPgorICAgICAgPHBhY2thZ2U+CisJPG5hbWU+Y2hyb21pdW08L25h bWU+CisJPHJhbmdlPjxsdD40Ni4wLjI0OTAuNzE8L2x0PjwvcmFuZ2U+CisgICAgICA8L3BhY2th Z2U+CisgICAgPC9hZmZlY3RzPgorICAgIDxkZXNjcmlwdGlvbj4KKyAgICAgIDxib2R5IHhtbG5z PSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hodG1sIj4KKwk8cD5Hb29nbGUgQ2hyb21lIFJlbGVh c2VzIHJlcG9ydHM6PC9wPgorCTxibG9ja3F1b3RlIGNpdGU9Imh0dHA6Ly9nb29nbGVjaHJvbWVy ZWxlYXNlcy5ibG9nc3BvdC5ubCI+CisJICA8cD4yNCBzZWN1cml0eSBmaXhlcyBpbiB0aGlzIHJl bGVhc2UsIGluY2x1ZGluZzo8L3A+CisgICAgICAgICAgPHVsPgorICAgICAgICAgICAgPGxpPls1 MTk1NThdIEhpZ2ggQ1ZFLTIwMTUtNjc1NTogQ3Jvc3Mtb3JpZ2luIGJ5cGFzcyBpbiBCbGluay4g Q3JlZGl0CisgICAgICAgICAgICAgIHRvIE1hcml1c3ogTWx5bnNraS48L2xpPgorCSAgICA8bGk+ WzUwNzMxNl0gSGlnaCBDVkUtMjAxNS02NzU2OiBVc2VyLWFmdGVyLWZyZWUgaW4gUERGaXVtLiBD cmVkaXQKKyAgICAgICAgICAgICAgdG8gYW5vbnltb3VzLjwvbGk+CisJICAgIDxsaT5bNTI5NTIw XSBIaWdoIENWRS0yMDE1LTY3NTc6IFVzZXItYWZ0ZXItZnJlZSBpbiBTZXJ2aWNlV29ya2VyLiBD cmVkaXQKKyAgICAgICAgICAgICAgdG8gQ29sbGluIFBheW5lLjwvbGk+CisJICAgIDxsaT5bNTIy MTMxXSBIaWdoIENWRS0yMDE1LTY3NTg6IEJhZC1jYXN0IGluIFBERml1bS4gQ3JlZGl0CisgICAg ICAgICAgICAgIHRvIEF0dGUgS2V0dHVuZW4gb2YgT1VTUEcuPC9saT4KKwkgICAgPGxpPls1MTQw NzZdIE1lZGl1bSBDVkUtMjAxNS02NzU5OiBJbmZvcm1hdGlvbiBsZWFrYWdlIGluIExvY2FsU3Rv cmFnZS4gQ3JlZGl0CisJICAgICAgdG8gTXVuZWFraSBOaXNoaW11cmEgKG5pc2hpbXVuZWEpLjwv bGk+CisJICAgIDxsaT5bNTE5NjQyXSBNZWRpdW0gQ1ZFLTIwMTUtNjc2MDogSW1wcm9wZXIgZXJy b3IgaGFuZGxpbmcgaW4gbGliQU5HTEUuIENyZWRpdAorCSAgICAgIHRvIGxhc3RsYW5kLm5ldC48 L2xpPgorCSAgICA8bGk+WzQ0Nzg2MF1bNTMyOTY3XSBNZWRpdW0gQ1ZFLTIwMTUtNjc2MTogTWVt b3J5IGNvcnJ1cHRpb24gaW4gRkZNcGVnLiBDcmVkaXQKKwkgICAgICB0byBBa2kgSGVsaW4gb2Yg T1VTUEcgYW5kIGFub255bW91cy48L2xpPgorCSAgICA8bGk+WzUxMjY3OF0gTG93IENWRS0yMDE1 LTY3NjI6IENPUlMgYnlwYXNzIHZpYSBDU1MgZm9udHMuIENyZWRpdAorCSAgICAgIHRvIE11bmVh a2kgTmlzaGltdXJhIChuaXNoaW11bmVhKS48L2xpPgorCSAgICA8bGk+WzU0MjUxN10gQ1ZFLTIw MTUtNjc2MzogVmFyaW91cyBmaXhlcyBmcm9tIGludGVybmFsIGF1ZGl0cywKKwkgICAgICBmdXp6 aW5nIGFuZCBvdGhlciBpbml0aWF0aXZlcy48L2xpPgorICAgICAgICAgIDwvdWw+CisJPC9ibG9j a3F1b3RlPgorICAgICAgPC9ib2R5PgorICAgIDwvZGVzY3JpcHRpb24+CisgICAgPHJlZmVyZW5j ZXM+CisgICAgICA8Y3ZlbmFtZT5DVkUtMjAxNS02NzU1PC9jdmVuYW1lPgorICAgICAgPGN2ZW5h bWU+Q1ZFLTIwMTUtNjc1NjwvY3ZlbmFtZT4KKyAgICAgIDxjdmVuYW1lPkNWRS0yMDE1LTY3NTc8 L2N2ZW5hbWU+CisgICAgICA8Y3ZlbmFtZT5DVkUtMjAxNS02NzU4PC9jdmVuYW1lPgorICAgICAg PGN2ZW5hbWU+Q1ZFLTIwMTUtNjc1OTwvY3ZlbmFtZT4KKyAgICAgIDxjdmVuYW1lPkNWRS0yMDE1 LTY3NjA8L2N2ZW5hbWU+CisgICAgICA8Y3ZlbmFtZT5DVkUtMjAxNS02NzYxPC9jdmVuYW1lPgor ICAgICAgPGN2ZW5hbWU+Q1ZFLTIwMTUtNjc2MjwvY3ZlbmFtZT4KKyAgICAgIDxjdmVuYW1lPkNW RS0yMDE1LTY3NjM8L2N2ZW5hbWU+IAorICAgICAgPHVybD5odHRwOi8vZ29vZ2xlY2hyb21lcmVs ZWFzZXMuYmxvZ3Nwb3Qubmw8L3VybD4KKyAgICA8L3JlZmVyZW5jZXM+CisgICAgPGRhdGVzPgor ICAgICAgPGRpc2NvdmVyeT4yMDE1LTEwLTEzPC9kaXNjb3Zlcnk+CisgICAgICA8ZW50cnk+MjAx NS0xMC0xNDwvZW50cnk+CisgICAgPC9kYXRlcz4KKyAgPC92dWxuPgorCiAgIDx2dWxuIHZpZD0i ODMwMWMwNGQtNzFkZi0xMWU1LTlmY2ItMDAyNjJkNWVkOGVlIj4KICAgICA8dG9waWM+Y2hyb21p dW0gLS0gbXVsdGlwbGUgdnVsbmVyYWJpbGl0aWVzPC90b3BpYz4KICAgICA8YWZmZWN0cz4K --=-34GOzjwdB2ZFC4XNoZsN-- --=-SEemib5YwZA2veu0seDX Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAABAgAGBQJWHlCWAAoJEKHzXWbm0FRT5VUIAKghXXmSVYgUX2+oKWtC/Hvo 9yHQpikp5i/bvLiOP9uJorXV98s0qjW9q5HpLh5pCY3B2Ez8zgkBiHCaJekjD6SH 3cKjSRifiGcaI0MHasagkmaL4PMmJkGGzMguNwd0gVNndw7wsLx8nQloQ3Haqajj dIWFzWyaODUYBFSEQJ1zsMmd5Tn+hLhNDMXfWVjEzzi8Mrzs6pZq4S3gNBbx7E8S JRfOlWK1DUEiBPBIAaitjv447Kbh0I/QX2TOgbYbPXirCK4JVhk3mMRC/8Z1vfGp c1RLOUq0RfKgzkghO9cNZuMCSWsTgbGV4JMBn8xxME2VmU8oR87AS9/rn6SOV70= =XD4W -----END PGP SIGNATURE----- --=-SEemib5YwZA2veu0seDX-- From owner-freebsd-chromium@freebsd.org Wed Oct 14 14:13:37 2015 Return-Path: Delivered-To: freebsd-chromium@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id ED608A13267 for ; Wed, 14 Oct 2015 14:13:37 +0000 (UTC) (envelope-from cmt@burggraben.net) Received: from smtp.burggraben.net (smtp.burggraben.net [IPv6:2a01:4f8:140:50a2::3:1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "ns.exwg.net", Issuer "Christoph Moench-Tegeder" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id AF3B410D9 for ; Wed, 14 Oct 2015 14:13:37 +0000 (UTC) (envelope-from cmt@burggraben.net) Received: from localhost (localhost [127.0.0.1]) by smtp.burggraben.net (Postfix) with ESMTP id 1191360008B for ; Wed, 14 Oct 2015 16:13:34 +0200 (CEST) X-Spam-Scanned: by amavisd-new at exwg.net Received: from smtp.burggraben.net ([127.0.0.1]) by localhost (ns.burggraben.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hv8wmeuw51Ee for ; Wed, 14 Oct 2015 16:13:33 +0200 (CEST) Received: from elch.exwg.net (elch.exwg.net [IPv6:2001:470:7120:1:922b:34ff:fe56:321]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "elch.exwg.net", Issuer "Christoph Moench-Tegeder" (verified OK)) by smtp.burggraben.net (Postfix) with ESMTPS for ; Wed, 14 Oct 2015 16:13:33 +0200 (CEST) Received: by elch.exwg.net (Postfix, from userid 1000) id CC6D9301D3; Wed, 14 Oct 2015 16:13:32 +0200 (CEST) Date: Wed, 14 Oct 2015 16:13:32 +0200 From: Christoph Moench-Tegeder To: freebsd-chromium@freebsd.org Subject: Re: Document new vulnerabilities in www/chromium < 46.0.2490.71 Message-ID: <20151014141332.GA1486@elch.exwg.net> References: <1444827286.41374.5.camel@fbsd.es> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1444827286.41374.5.camel@fbsd.es> User-Agent: Mutt/1.5.24 (2015-08-30) X-BeenThere: freebsd-chromium@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: FreeBSD-specific Chromium issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Oct 2015 14:13:38 -0000 ## Carlos J Puga Medina (cpm@fbsd.es): > Current www/chromium is marked as vulnerable on Google Chrome > website[0]. I'm working on the update. If anyone else is doing the same, please speak up - we should avoid duplicated effort. Regards, Christoph -- Spare Space From owner-freebsd-chromium@freebsd.org Thu Oct 15 12:47:08 2015 Return-Path: Delivered-To: freebsd-chromium@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 34D1DA13D06 for ; Thu, 15 Oct 2015 12:47:08 +0000 (UTC) (envelope-from cmt@burggraben.net) Received: from smtp.burggraben.net (smtp.burggraben.net [IPv6:2a01:4f8:140:50a2::3:1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "ns.exwg.net", Issuer "Christoph Moench-Tegeder" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id E8FFA1897 for ; Thu, 15 Oct 2015 12:47:07 +0000 (UTC) (envelope-from cmt@burggraben.net) Received: from localhost (localhost [127.0.0.1]) by smtp.burggraben.net (Postfix) with ESMTP id 13B3560008B for ; Thu, 15 Oct 2015 14:47:04 +0200 (CEST) X-Spam-Scanned: by amavisd-new at exwg.net Received: from smtp.burggraben.net ([127.0.0.1]) by localhost (ns.burggraben.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nDYpQrMRN3As for ; Thu, 15 Oct 2015 14:47:02 +0200 (CEST) Received: from elch.exwg.net (elch.exwg.net [IPv6:2001:470:7120:1:922b:34ff:fe56:321]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "elch.exwg.net", Issuer "Christoph Moench-Tegeder" (verified OK)) by smtp.burggraben.net (Postfix) with ESMTPS for ; Thu, 15 Oct 2015 14:47:02 +0200 (CEST) Received: by elch.exwg.net (Postfix, from userid 1000) id 7F82530211; Thu, 15 Oct 2015 14:47:02 +0200 (CEST) Date: Thu, 15 Oct 2015 14:47:02 +0200 From: Christoph Moench-Tegeder To: freebsd-chromium@freebsd.org Subject: Re: Document new vulnerabilities in www/chromium < 46.0.2490.71 Message-ID: <20151015124702.GA1479@elch.exwg.net> References: <1444827286.41374.5.camel@fbsd.es> <20151014141332.GA1486@elch.exwg.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20151014141332.GA1486@elch.exwg.net> User-Agent: Mutt/1.5.24 (2015-08-30) X-BeenThere: freebsd-chromium@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: FreeBSD-specific Chromium issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 12:47:08 -0000 ## Christoph Moench-Tegeder (cmt@burggraben.net): > > Current www/chromium is marked as vulnerable on Google Chrome > > website[0]. > I'm working on the update. And done: https://github.com/gliaskos/freebsd-chromium/pull/38 Compiling chrome takes longer with each release (I guess that's a reminder to keep my hardware up-to-date). Regards, Christoph -- Spare Space