On Wed, Feb 5, 2014 at 12:30 AM, Robert Arkiletian <rob...@gmail.com> wrote:

> new potential remote code exploit in Chromium flash.
> http://googlechromereleases.blogspot.ca/2014/02/stable-channel-update.html
>
> Doesn't look like these repos are being updated.
> http://people.redhat.com/tpopela/rpms/
> http://people.centos.org/hughesjr/chromium/6/
>
> Any info on this issue would be welcome.
>


Yes, please. Can the CentOS folks check with their newly minted Red Hat
brethren on this issue?

This is getting critical for us. We have over a hundred CO6 desktops that
are currently running an insecure version of chromium. The security people
are all over us on this!

We need to run chrome/chromium in order to manage our Google Apps for
Government deployment (for over 1000 users). It doesn't work right with
firefox.

If we need to apply pressure elsewhere, please let us know where to direct
our fury.

-- 
Matt Phelps
System Administrator, Computation Facility
Harvard - Smithsonian Center for Astrophysics
mphe...@cfa.harvard.edu, http://www.cfa.harvard.edu
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to