Date: Mon, 17 Dec 2018 09:18:57 -0800 From: Cy Schubert <Cy.Schubert@cschubert.com> To: Roger Marquis <marquis@roble.com>, Kubilay Kocak <koobs@FreeBSD.org> Cc: "ports-secteam@FreeBSD.org" <ports-secteam@FreeBSD.org>, "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>, Brooks Davis <brooks@freebsd.org> Subject: RE: SQLite vulnerability Message-ID: <20181217171856.5181F49C6@spqr.komquats.com>
next in thread | raw e-mail | index | archive | help
Base needs updating. --- Sent using a tiny phone keyboard. Apologies for any typos and autocorrect. Also, this old phone only supports top post. Apologies. Cy Schubert <Cy.Schubert@cschubert.com> or <cy@freebsd.org> The need of the many outweighs the greed of the few. --- -----Original Message----- From: Roger Marquis Sent: 17/12/2018 08:09 To: Kubilay Kocak Cc: ports-secteam@FreeBSD.org; freebsd-security@freebsd.org; Brooks Davis Subject: Re: SQLite vulnerability On Mon, 17 Dec 2018, Kubilay Kocak wrote: > Pretty close :) > Original source/announcement: > https://www.tenable.com/blog/magellan-remote-code-execution-vulnerability= -in-sqlite-disclosed=20 > [December 14th, 2018] Not original though Tenable may have based their announcement on: https://meterpreter.org/sqlite-remote-code-execution-vulnerability-alert= / [December 11th, 2014] > I've already re-opened Issue #233712 [1], which was our databases/sqlite3= =20 > port update to 3.26.0 and requested a merge to quarterly. Thank you Kubila and thanks to pavelivolkov@gmail.com who updated the sqlit= e3 port on December 4th. Roger Marquis _______________________________________________ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20181217171856.5181F49C6>