On 06/02/14 16:26, Phelps, Matt wrote:
> On Wed, Feb 5, 2014 at 12:30 AM, Robert Arkiletian <rob...@gmail.com> wrote:
> 
>> new potential remote code exploit in Chromium flash.
>> http://googlechromereleases.blogspot.ca/2014/02/stable-channel-update.html
>>
>> Doesn't look like these repos are being updated.
>> http://people.redhat.com/tpopela/rpms/
>> http://people.centos.org/hughesjr/chromium/6/
>>
>> Any info on this issue would be welcome.
>>
> 
> 
> Yes, please. Can the CentOS folks check with their newly minted Red Hat
> brethren on this issue?
> 
> This is getting critical for us. We have over a hundred CO6 desktops that
> are currently running an insecure version of chromium. The security people
> are all over us on this!
> 
> We need to run chrome/chromium in order to manage our Google Apps for
> Government deployment (for over 1000 users). It doesn't work right with
> firefox.
> 
> If we need to apply pressure elsewhere, please let us know where to direct
> our fury.
> 

... to Google ? (especially because it's *their* browser to support
*their* Google Apps ....)

-- 
Fabian Arrotin
gpg key: 56BEC54E | twitter: @arrfab
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to