Anyone running Freenet must upgrade to at least Sun Java 6 Update 15 or Sun 
Java 5 Update 20.

Until you are able to do this, please shut down anything that parses XML, 
specifically:
- Do not use the search function (XMLLibrarian).
- Unload the WoT and Freetalk plugins if you are using them. Likewise with 
Library etc.
- Do not use Thaw. Shut it down if it is running.

Other applications may also be vulnerable via the Python libexpat and Apache 
Xerces libraries, so you should update your distribution ASAP. However, not all 
applications that process XML are vulnerable as there are a number of XML 
parsers.

This concerns both denial of service and remote code execution and thus is a 
*SEVERE* vulnerability.

I will be putting out a new build ASAP, which will tell any users who haven't 
upgraded to upgrade and will disable XMLLibrarian until they do so.

http://www.cert.fi/en/reports/2009/vulnerability2009085.html

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to