Date: Sun, 1 May 2016 07:33:16 +0000 (UTC) From: Bernard Spil <brnrd@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r414389 - head/security/vuxml Message-ID: <201605010733.u417XGHV057293@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: brnrd Date: Sun May 1 07:33:15 2016 New Revision: 414389 URL: https://svnweb.freebsd.org/changeset/ports/414389 Log: security/vuxml: Add entry for MySQL/MariaDB/Percona April Critical Patch Update - Add entry for 31 security fixes for Oracle MySQL - Add also affected MariaDB packages - Add also affected Percona packages Reviewed by: junovitch (ports-secteam) Approved by: junovitch (ports-secteam) Differential Revision: D6159 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun May 1 07:21:56 2016 (r414388) +++ head/security/vuxml/vuln.xml Sun May 1 07:33:15 2016 (r414389) @@ -58,6 +58,94 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8c2b2f11-0ebe-11e6-b55e-b499baebfeaf"> + <topic>MySQL -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mariadb55-server</name> + <range><lt>5.5.49</lt></range> + </package> + <package> + <name>mariadb100-server</name> + <range><lt>10.0.25</lt></range> + </package> + <package> + <name>mariadb101-server</name> + <range><lt>10.1.12</lt></range> + </package> + <package> + <name>mysql55-server</name> + <range><lt>5.5.49</lt></range> + </package> + <package> + <name>mysql56-server</name> + <range><lt>5.6.30</lt></range> + </package> + <package> + <name>mysql57-server</name> + <range><lt>5.7.12</lt></range> + </package> + <package> + <name>percona55-server</name> + <range><lt>5.5.49</lt></range> + </package> + <package> + <name>percona-server</name> + <range><lt>5.6.30</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Oracle reports reports:</p> + <blockquote cite="http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL"> + <p>Critical Patch Update contains 31 new security fixes for Oracle MySQL + 5.5.48, 5.6.29, 5.7.11 and earlier</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL</url> + <url>https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/</url> + <url>https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/</url> + <url>https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/</url> + <cvename>CVE-2016-0705</cvename> + <cvename>CVE-2016-0639</cvename> + <cvename>CVE-2015-3194</cvename> + <cvename>CVE-2016-0640</cvename> + <cvename>CVE-2016-0641</cvename> + <cvename>CVE-2016-3461</cvename> + <cvename>CVE-2016-2047</cvename> + <cvename>CVE-2016-0642</cvename> + <cvename>CVE-2016-0643</cvename> + <cvename>CVE-2016-0644</cvename> + <cvename>CVE-2016-0646</cvename> + <cvename>CVE-2016-0647</cvename> + <cvename>CVE-2016-0648</cvename> + <cvename>CVE-2016-0649</cvename> + <cvename>CVE-2016-0650</cvename> + <cvename>CVE-2016-0652</cvename> + <cvename>CVE-2016-0653</cvename> + <cvename>CVE-2016-0654</cvename> + <cvename>CVE-2016-0655</cvename> + <cvename>CVE-2016-0656</cvename> + <cvename>CVE-2016-0657</cvename> + <cvename>CVE-2016-0658</cvename> + <cvename>CVE-2016-0651</cvename> + <cvename>CVE-2016-0659</cvename> + <cvename>CVE-2016-0661</cvename> + <cvename>CVE-2016-0662</cvename> + <cvename>CVE-2016-0663</cvename> + <cvename>CVE-2016-0665</cvename> + <cvename>CVE-2016-0666</cvename> + <cvename>CVE-2016-0667</cvename> + <cvename>CVE-2016-0668</cvename> + </references> + <dates> + <discovery>2016-04-19</discovery> + <entry>2016-04-30</entry> + </dates> + </vuln> + <vuln vid="f2d4f879-0d7c-11e6-925f-6805ca0b3d42"> <topic>logstash -- password disclosure vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201605010733.u417XGHV057293>