Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Dec 2018 19:48:38 +0100
From:      Remko Lodder <remko@elvandar.org>
To:        Roger Marquis <marquis@roble.com>
Cc:        freebsd-security@freebsd.org, "ports-secteam@freebsd.org" <ports-secteam@FreeBSD.org>
Subject:   Re: SQLite vulnerability
Message-ID:  <473172DA-7F1E-42EB-8E0B-53122E13E84E@elvandar.org>
In-Reply-To: <nycvar.OFS.7.76.444.1812160753280.5993@mx.roble.com>
References:  <nycvar.OFS.7.76.444.1812160753280.5993@mx.roble.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail=_076457B1-04D4-45E9-929B-A3627A071F1A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi,

It=E2=80=99s sad to see that you are still as negative as you where not =
that long ago.

I said before that If you rely on the information being up to date, you =
should
sponsor the FF or pay someone to do the work for you. You keep =
forgetting
that we (security-officer@ and ports-secteam@) are volunteers and that
we do this in our free spare time. You cannot demand that we do things =
that
you expect us to do without knowing how people lives are going at that =
same
moment. If they have to choose between your whining and their kids or
family, I would also choose the family.

I do not think the others need to step in for this one, your constant =
negative
attitude towards our ports-secteam people is getting annoying and a =
waste
of our precious time. So either start sending patches, contribute, or =
understand
that this is voluntarily and that their priorities might not be your =
priority.

Thank you, once and for all,
Remko.

> On 16 Dec 2018, at 17:13, Roger Marquis <marquis@roble.com> wrote:
>=20
> Thanks to Chrome{,ium} a recently discovered SQLite exploit has been =
all
> over the news for a week now.  It is patched on all Linux platforms =
but
> has not yet shown up in FreeBSD's vulxml database.  Does this mean:
>=20
> A) FreeBSD versions prior to 3.26.0 are not vulnerable, or
>=20
> B) the ports-secteam is not able to properly maintain the =
vulnerability
> database?
>=20
> If the latter perhaps someone from the security team could let us know
> how such a significant vulnerability could go unflagged for so long =
and,
> more importantly, what might be done to address the gap in reporting?
>=20
> Roger Marquis


--Apple-Mail=_076457B1-04D4-45E9-929B-A3627A071F1A
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
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=EYpB
-----END PGP SIGNATURE-----

--Apple-Mail=_076457B1-04D4-45E9-929B-A3627A071F1A--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?473172DA-7F1E-42EB-8E0B-53122E13E84E>