From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 75283138306 for ; Wed, 13 Jul 2016 20:53:59 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id A6C8221C2CF; Wed, 13 Jul 2016 20:53:39 +0000 (UTC) Received: from ironport2-out.teksavvy.com (ironport2-out.teksavvy.com [206.248.154.181]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 82D1621C07F for ; Wed, 13 Jul 2016 20:53:38 +0000 (UTC) X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BTIAA731xV/xgWNJ1cgxBUXsNcCYFahW0EBAICgTw5FAEBAQEBAQGBCkEBAwGDXQEBBAwmASMzCxgJExIPBQ0YNwmIDgMSDcoSDYR3AQEBBwEBAQEeizqCTYI/FoMBgRYFnBqBVYd4iCGGfCOEFCIxAYJGAQEB X-IPAS-Result: A0BTIAA731xV/xgWNJ1cgxBUXsNcCYFahW0EBAICgTw5FAEBAQEBAQGBCkEBAwGDXQEBBAwmASMzCxgJExIPBQ0YNwmIDgMSDcoSDYR3AQEBBwEBAQEeizqCTYI/FoMBgRYFnBqBVYd4iCGGfCOEFCIxAYJGAQEB X-IronPort-AV: E=Sophos;i="5.13,465,1427774400"; d="scan'208";a="247809560" Received: from 157-52-22-24.cpe.teksavvy.com (HELO waltdnes.org) ([157.52.22.24]) by ironport2-out.teksavvy.com with SMTP; 13 Jul 2016 16:53:36 -0400 Received: by waltdnes.org (sSMTP sendmail emulation); Wed, 13 Jul 2016 16:53:40 -0400 From: waltdnes@waltdnes.org Date: Wed, 13 Jul 2016 16:53:40 -0400 To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] Re: Is "-fomit-frame-pointer" a gcc default? Message-ID: <20160713205339.GA15734@waltdnes.org> References: <20160711202742.GA6195@waltdnes.org> <20160712130725.f4e0ea292e49319df56688d2@gentoo.org> <20160712170928.7d34d4b7@sepulchrave.remarqs> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20160712170928.7d34d4b7@sepulchrave.remarqs> User-Agent: Mutt/1.5.24 (2015-08-30) X-Archives-Salt: 30e6d81d-af12-48b0-8461-d826757cbc93 X-Archives-Hash: a63b9eb018b08d41fa0db6a654adaca3 On Tue, Jul 12, 2016 at 05:09:28PM -0500, »Q« wrote > On Tue, 12 Jul 2016 12:14:57 -0500 > R0b0t1 wrote: > > > Pale Moon is routinely behind Firefox on security fixes (actual fixes, > > not wanking-in-a-corner fixes). > > Is anyone other than the Pale Moon team itself trying to track its > vulnerabilities? I could only find one CVE for it, from 2013. See http://www.palemoon.org/releasenotes.shtml with several mentions of CVEs and other security fixes. Given the amount of Firefox code still present "under the hood", many Firefox security fixes will also apply to Pale Moon. -- Walter Dnes I don't run "desktop environments"; I run useful applications