Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 5 Aug 2016 23:23:00 +0200
From:      Michael Grimm <trashcan@ellael.org>
To:        freebsd-ports@FreeBSD.org
Cc:        FreeBSD Ports Security Team <ports-secteam@freebsd.org>
Subject:   mariadb101-server vulnerability? (was: tiff vulnerability in ports?)
Message-ID:  <F7C5E254-6801-4274-A973-9ECBAB3EA20F@ellael.org>
In-Reply-To: <b05d61de-03e7-0599-17c9-0d055ac8ab61@FreeBSD.org>
References:  <CACcSE1z4m_o9z2Ttw-Sb7bNhVmnwDrVX8BQFfa2a_dBbW_hwyw@mail.gmail.com> <CAJN5%2BGtsJ=n2m8Xz5eZj92yo5vFZST0dO1ZnLCpmf4x0H95w-Q@mail.gmail.com> <33ac70de-78b6-dc54-e81f-3153d0d721e4@FreeBSD.org> <b05d61de-03e7-0599-17c9-0d055ac8ab61@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi =E2=80=94

Kubilay Kocak <koobs@FreeBSD.org> wrote:

> Unfortunately you are yet one more example of a user that's been left =
in
> the lurch without information or recourse wondering (rightfully) how
> they can resolve or mitigate this vulnerability. Our apologies.

While we are that topic, I am wondering about that 14 days old warning, =
as well:

	mariadb101-server-10.1.16 is vulnerable:
	MySQL -- Multiple vulnerabilities
	CVE: CVE-2016-3452
[long list of CVEs snipped]
	CVE: CVE-2016-3477
	=
https://vuxml.FreeBSD.org/freebsd/ca5cb202-4f51-11e6-b2ec-b499baebfeaf.htm=
l

I really do not know how serious this report is. Every feedback is =
highly appreciated.

Thanks and with kind regards,
Michael




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F7C5E254-6801-4274-A973-9ECBAB3EA20F>