Base needs updating.
---
Sent using a tiny phone keyboard.
Apologies for any typos and autocorrect.
Also, this old phone only supports top post. Apologies.
Cy Schubert
<Cy.Schubert at cschubert.com> or <cy at freebsd.org>
The need of the many outweighs the greed of the few.
---
-----Original Message-----
From: Roger Marquis
Sent: 17/12/2018 08:09
To: Kubilay Kocak
Cc: ports-secteam at FreeBSD.org; freebsd-security at freebsd.org; Brooks Davis
Subject: Re: SQLite vulnerability
On Mon, 17 Dec 2018, Kubilay Kocak wrote:> Pretty close :)
> Original source/announcement:
>
https://www.tenable.com/blog/magellan-remote-code-execution-vulnerability-in-sqlite-disclosed
> [December 14th, 2018]
Not original though Tenable may have based their announcement on:
https://meterpreter.org/sqlite-remote-code-execution-vulnerability-alert/
[December 11th, 2014]
> I've already re-opened Issue #233712 [1], which was our
databases/sqlite3
> port update to 3.26.0 and requested a merge to quarterly.
Thank you Kubila and thanks to pavelivolkov at gmail.com who updated the sqlite3
port on December 4th.
Roger Marquis
_______________________________________________
freebsd-security at freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe at
freebsd.org"