From owner-dev-commits-ports-all@freebsd.org Wed Aug 4 08:11:06 2021
Return-Path:
Delivered-To: dev-commits-ports-all@mailman.nyi.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1])
by mailman.nyi.freebsd.org (Postfix) with ESMTP id 62039659948;
Wed, 4 Aug 2021 08:11:06 +0000 (UTC) (envelope-from git@FreeBSD.org)
Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org
[IPv6:2610:1c1:1:606c::19:3])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256
client-signature RSA-PSS (4096 bits) client-digest SHA256)
(Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK))
by mx1.freebsd.org (Postfix) with ESMTPS id 4Gfkvt2NWVz3J52;
Wed, 4 Aug 2021 08:11:06 +0000 (UTC) (envelope-from git@FreeBSD.org)
Received: from gitrepo.freebsd.org (gitrepo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:5])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256)
(Client did not present a certificate)
by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 3A26022DF7;
Wed, 4 Aug 2021 08:11:06 +0000 (UTC) (envelope-from git@FreeBSD.org)
Received: from gitrepo.freebsd.org ([127.0.1.44])
by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 1748B61Y079926;
Wed, 4 Aug 2021 08:11:06 GMT (envelope-from git@gitrepo.freebsd.org)
Received: (from git@localhost)
by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 1748B67T079925;
Wed, 4 Aug 2021 08:11:06 GMT (envelope-from git)
Date: Wed, 4 Aug 2021 08:11:06 GMT
Message-Id: <202108040811.1748B67T079925@gitrepo.freebsd.org>
To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org,
dev-commits-ports-main@FreeBSD.org
From: Bernard Spil
Subject: git: 7583b9a0d9d0 - main - security/vuxml: Mark MariaDB vulnerable
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
X-Git-Committer: brnrd
X-Git-Repository: ports
X-Git-Refname: refs/heads/main
X-Git-Reftype: branch
X-Git-Commit: 7583b9a0d9d0445f225d5f511fdd3f83db0e6f51
Auto-Submitted: auto-generated
X-BeenThere: dev-commits-ports-all@freebsd.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Commit messages for all branches of the ports repository
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 04 Aug 2021 08:11:06 -0000
The branch main has been updated by brnrd:
URL: https://cgit.FreeBSD.org/ports/commit/?id=7583b9a0d9d0445f225d5f511fdd3f83db0e6f51
commit 7583b9a0d9d0445f225d5f511fdd3f83db0e6f51
Author: Bernard Spil
AuthorDate: 2021-08-04 08:10:56 +0000
Commit: Bernard Spil
CommitDate: 2021-08-04 08:10:56 +0000
security/vuxml: Mark MariaDB vulnerable
---
security/vuxml/vuln-2021.xml | 52 ++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 52 insertions(+)
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index b4a482f88b4c..bad459317b22 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -636,6 +636,18 @@ In limited circumstances it was possible for users to authenticate using variati
mysql80-server
8.0.26
+
+ mariadb103-server
+ 10.3.31
+
+
+ mariadb104-server
+ 10.4.21
+
+
+ mariadb105-server
+ 10.5.12
+
@@ -647,15 +659,55 @@ In limited circumstances it was possible for users to authenticate using variati
requiring user credentials.
The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle
MySQL is 8.8.
+ MariaDB is affected by CVE-2021-2372 and CVE-2021-2389 only.
https://www.oracle.com/security-alerts/cpujul2021.html
+ CVE-2019-17543
+ CVE-2021-2339
+ CVE-2021-2340
+ CVE-2021-2342
+ CVE-2021-2352
+ CVE-2021-2354
+ CVE-2021-2356
+ CVE-2021-2357
+ CVE-2021-2367
+ CVE-2021-2370
+ CVE-2021-2372
+ CVE-2021-2374
+ CVE-2021-2383
+ CVE-2021-2384
+ CVE-2021-2385
+ CVE-2021-2387
+ CVE-2021-2389
+ CVE-2021-2390
+ CVE-2021-2399
+ CVE-2021-2402
+ CVE-2021-2410
+ CVE-2021-2411
+ CVE-2021-2412
+ CVE-2021-2417
+ CVE-2021-2418
+ CVE-2021-2422
+ CVE-2021-2424
+ CVE-2021-2425
+ CVE-2021-2426
+ CVE-2021-2427
+ CVE-2021-2429
+ CVE-2021-2437
+ CVE-2021-2440
+ CVE-2021-2441
+ CVE-2021-2444
+ CVE-2021-3450
+ CVE-2021-22884
+ CVE-2021-22901
2021-07-20
2021-07-20
+ 2021-08-04