Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Aug 2009 00:28:58 -0500
From:      Mark Linimon <linimon@lonesome.com>
To:        Klaus Koch <klaus@sentinel.dyndns.info>
Cc:        ports@freebsd.org, glewis@freebsd.org
Subject:   Re: diablo-jdk-1.6.0.07.02_5 remote code execution exploit
Message-ID:  <20090816052858.GA3928@lonesome.com>
In-Reply-To: <200908091016.52261.klaus@sentinel.dyndns.info>
References:  <200908091016.52261.klaus@sentinel.dyndns.info>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Aug 09, 2009 at 10:16:44AM +0200, Klaus Koch wrote:
> as of 6th of August, there's a possible remote code execution exploit
> known in both "Sun JDK and JRE 6 Update 14 and earlier" and "Sun JDK
> and JRE 5.0 Update 19 and earlier" [...] I didn't get any notifications
> with portaudit yet. Because I don't know who to contact else, I'm
> sending this to the port maintainer/team.

For future reference, the right mailing address is secteam@FreeBSD.org.
This is an address rather than a mailing list so tat fixes may be
developed before vulnerabilities are announced.

mcl



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090816052858.GA3928>