On Wed, Jun 12, 2019 at 03:05:13AM +1000, Andrew McGlashan wrote: > Exploiting the flaws needs malicious code to be running on your box. If > you are in total control over all VMs and processes on the box, then you > should be good. do you use a webbrowser with javascript enabled? -- tschau, Holger ------------------------------------------------------------------------------- holger@(debian|reproducible-builds|layer-acht).org PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
Attachment:
signature.asc
Description: PGP signature