Date: Sun, 16 Aug 2009 00:28:58 -0500 From: Mark Linimon <linimon@lonesome.com> To: Klaus Koch <klaus@sentinel.dyndns.info> Cc: ports@freebsd.org, glewis@freebsd.org Subject: Re: diablo-jdk-1.6.0.07.02_5 remote code execution exploit Message-ID: <20090816052858.GA3928@lonesome.com> In-Reply-To: <200908091016.52261.klaus@sentinel.dyndns.info> References: <200908091016.52261.klaus@sentinel.dyndns.info>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Aug 09, 2009 at 10:16:44AM +0200, Klaus Koch wrote: > as of 6th of August, there's a possible remote code execution exploit > known in both "Sun JDK and JRE 6 Update 14 and earlier" and "Sun JDK > and JRE 5.0 Update 19 and earlier" [...] I didn't get any notifications > with portaudit yet. Because I don't know who to contact else, I'm > sending this to the port maintainer/team. For future reference, the right mailing address is secteam@FreeBSD.org. This is an address rather than a mailing list so tat fixes may be developed before vulnerabilities are announced. mcl
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090816052858.GA3928>