Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 9 Aug 2009 10:16:44 +0200
From:      Klaus Koch <klaus@sentinel.dyndns.info>
To:        glewis@freebsd.org
Cc:        ports@freebsd.org
Subject:   diablo-jdk-1.6.0.07.02_5 remote code execution exploit
Message-ID:  <200908091016.52261.klaus@sentinel.dyndns.info>

next in thread | raw e-mail | index | archive | help
--nextPart3836196.mKzBQcVb8K
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Hello,

as of 6th of August, there's a possible remote code execution exploit known=
 in=20
both "Sun JDK and JRE 6 Update 14 and earlier" and "Sun JDK and JRE 5.0=20
Update 19 and earlier"

details: http://www.cert.fi/en/reports/2009/vulnerability2009085.html

I didn't get any notifications with portaudit yet. Because I don't know who=
 to=20
contact else, I'm sending this to the port maintainer/team.


Kind regards,

Klaus

--nextPart3836196.mKzBQcVb8K
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQBKfoX0gxGphk2dP5wRApSbAKCLLNzr9rW2gEIhYagCqLSGTmcIswCcCjto
xfDLO5+ISev5Pz1yZHB6FyM=
=5LJC
-----END PGP SIGNATURE-----

--nextPart3836196.mKzBQcVb8K--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200908091016.52261.klaus>