Date: Fri, 5 Aug 2016 23:23:00 +0200 From: Michael Grimm <trashcan@ellael.org> To: freebsd-ports@FreeBSD.org Cc: FreeBSD Ports Security Team <ports-secteam@freebsd.org> Subject: mariadb101-server vulnerability? (was: tiff vulnerability in ports?) Message-ID: <F7C5E254-6801-4274-A973-9ECBAB3EA20F@ellael.org> In-Reply-To: <b05d61de-03e7-0599-17c9-0d055ac8ab61@FreeBSD.org> References: <CACcSE1z4m_o9z2Ttw-Sb7bNhVmnwDrVX8BQFfa2a_dBbW_hwyw@mail.gmail.com> <CAJN5%2BGtsJ=n2m8Xz5eZj92yo5vFZST0dO1ZnLCpmf4x0H95w-Q@mail.gmail.com> <33ac70de-78b6-dc54-e81f-3153d0d721e4@FreeBSD.org> <b05d61de-03e7-0599-17c9-0d055ac8ab61@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi =E2=80=94 Kubilay Kocak <koobs@FreeBSD.org> wrote: > Unfortunately you are yet one more example of a user that's been left = in > the lurch without information or recourse wondering (rightfully) how > they can resolve or mitigate this vulnerability. Our apologies. While we are that topic, I am wondering about that 14 days old warning, = as well: mariadb101-server-10.1.16 is vulnerable: MySQL -- Multiple vulnerabilities CVE: CVE-2016-3452 [long list of CVEs snipped] CVE: CVE-2016-3477 = https://vuxml.FreeBSD.org/freebsd/ca5cb202-4f51-11e6-b2ec-b499baebfeaf.htm= l I really do not know how serious this report is. Every feedback is = highly appreciated. Thanks and with kind regards, Michael
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F7C5E254-6801-4274-A973-9ECBAB3EA20F>