Date: Sun, 9 Aug 2009 10:16:44 +0200 From: Klaus Koch <klaus@sentinel.dyndns.info> To: glewis@freebsd.org Cc: ports@freebsd.org Subject: diablo-jdk-1.6.0.07.02_5 remote code execution exploit Message-ID: <200908091016.52261.klaus@sentinel.dyndns.info>
next in thread | raw e-mail | index | archive | help
--nextPart3836196.mKzBQcVb8K Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline Hello, as of 6th of August, there's a possible remote code execution exploit known= in=20 both "Sun JDK and JRE 6 Update 14 and earlier" and "Sun JDK and JRE 5.0=20 Update 19 and earlier" details: http://www.cert.fi/en/reports/2009/vulnerability2009085.html I didn't get any notifications with portaudit yet. Because I don't know who= to=20 contact else, I'm sending this to the port maintainer/team. Kind regards, Klaus --nextPart3836196.mKzBQcVb8K Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQBKfoX0gxGphk2dP5wRApSbAKCLLNzr9rW2gEIhYagCqLSGTmcIswCcCjto xfDLO5+ISev5Pz1yZHB6FyM= =5LJC -----END PGP SIGNATURE----- --nextPart3836196.mKzBQcVb8K--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200908091016.52261.klaus>