Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Dec 2018 09:18:57 -0800
From:      Cy Schubert <Cy.Schubert@cschubert.com>
To:        Roger Marquis <marquis@roble.com>, Kubilay Kocak <koobs@FreeBSD.org>
Cc:        "ports-secteam@FreeBSD.org" <ports-secteam@FreeBSD.org>,  "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>,  Brooks Davis <brooks@freebsd.org>
Subject:   RE: SQLite vulnerability
Message-ID:  <20181217171856.5181F49C6@spqr.komquats.com>

next in thread | raw e-mail | index | archive | help
Base needs updating.

---
Sent using a tiny phone keyboard.
Apologies for any typos and autocorrect.
Also, this old phone only supports top post. Apologies.

Cy Schubert
<Cy.Schubert@cschubert.com> or <cy@freebsd.org>
The need of the many outweighs the greed of the few.
---

-----Original Message-----
From: Roger Marquis
Sent: 17/12/2018 08:09
To: Kubilay Kocak
Cc: ports-secteam@FreeBSD.org; freebsd-security@freebsd.org; Brooks Davis
Subject: Re: SQLite vulnerability

On Mon, 17 Dec 2018, Kubilay Kocak wrote:
> Pretty close :)
> Original source/announcement:
> https://www.tenable.com/blog/magellan-remote-code-execution-vulnerability=
-in-sqlite-disclosed=20
> [December 14th, 2018]

Not original though Tenable may have based their announcement on:

   https://meterpreter.org/sqlite-remote-code-execution-vulnerability-alert=
/
   [December 11th, 2014]

> I've already re-opened Issue #233712 [1], which was our databases/sqlite3=
=20
> port update to 3.26.0 and requested a merge to quarterly.

Thank you Kubila and thanks to pavelivolkov@gmail.com who updated the sqlit=
e3
port on December 4th.

Roger Marquis
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20181217171856.5181F49C6>