Date: Tue, 6 Sep 2011 17:59:28 +0100 From: Chris Rees <crees@freebsd.org> To: Greg Lewis <glewis@eyesbeyond.com> Cc: java@freebsd.org Subject: Re: CVE for Java Message-ID: <CADLo838HM148g46co9S=Uxaebgjyap3BgqziUD=kxi3Ws2OC2Q@mail.gmail.com> In-Reply-To: <20110906042713.GA70947@misty.eyesbeyond.com> References: <CADLo83-Kdwe4X0v4tGOey8TJzg3LExS9ShiOOX0UdJ_kMPC=4g@mail.gmail.com> <20110906042713.GA70947@misty.eyesbeyond.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 6 Sep 2011 05:27, "Greg Lewis" <glewis@eyesbeyond.com> wrote: > > G'day Chris, > > On Sat, Sep 03, 2011 at 11:36:49AM +0100, Chris Rees wrote: > > Hey all, > > > > Should there be a vuxml for this? I'm happy to write one if necessary. > > > > http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-3= 05811.html > > All the ports built from source had a patch committed for that > vulnerability back in February. =A0I think we've got the Linux ports at a= n > update that includes the fix. =A0The diablo ports are vulnerable though. > That's a bugger... Any chance of new diablo ports? I don't mind helping to build them if that's what it needs; I'm not familiar with the process of making the tarballs. We really should stick in a vuxml too-- people need kicking up the backside to update! Chris
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADLo838HM148g46co9S=Uxaebgjyap3BgqziUD=kxi3Ws2OC2Q>