Date: Sat, 20 Oct 2018 07:58:43 +0000 (UTC) From: Bernard Spil <brnrd@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r482473 - head/security/vuxml Message-ID: <201810200758.w9K7whgd000635@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: brnrd Date: Sat Oct 20 07:58:43 2018 New Revision: 482473 URL: https://svnweb.freebsd.org/changeset/ports/482473 Log: security/vuxml: Document 2018-10 MySQL vulnerabilities Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Oct 20 07:56:45 2018 (r482472) +++ head/security/vuxml/vuln.xml Sat Oct 20 07:58:43 2018 (r482473) @@ -58,6 +58,107 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ec5072b0-d43a-11e8-a6d2-b499baebfeaf"> + <topic>MySQL -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mariadb55-server</name> + <range><lt>5.5.62</lt></range> + </package> + <package> + <name>mariadb100-server</name> + <range><lt>10.0.37</lt></range> + </package> + <package> + <name>mariadb101-server</name> + <range><lt>10.1.37</lt></range> + </package> + <package> + <name>mariadb102-server</name> + <range><lt>10.2.19</lt></range> + </package> + <package> + <name>mariadb103-server</name> + <range><lt>10.3.10</lt></range> + </package> + <package> + <name>mysql55-server</name> + <range><lt>5.5.62</lt></range> + </package> + <package> + <name>mysql56-server</name> + <range><lt>5.6.42</lt></range> + </package> + <package> + <name>mysql57-server</name> + <range><lt>5.7.24</lt></range> + </package> + <package> + <name>mysql80-server</name> + <range><lt>8.0.13</lt></range> + </package> + <package> + <name>percona55-server</name> + <range><lt>5.5.62</lt></range> + </package> + <package> + <name>percona56-server</name> + <range><lt>5.6.42</lt></range> + </package> + <package> + <name>percona57-server</name> + <range><lt>5.7.24</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Oracle reports:</p> + <blockquote cite="https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL"> + <p>Please reference CVE/URL list for details</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL</url> + <cvename>CVE-2016-9843</cvename> + <cvename>CVE-2018-3155</cvename> + <cvename>CVE-2018-3143</cvename> + <cvename>CVE-2018-3156</cvename> + <cvename>CVE-2018-3251</cvename> + <cvename>CVE-2018-3182</cvename> + <cvename>CVE-2018-3137</cvename> + <cvename>CVE-2018-3203</cvename> + <cvename>CVE-2018-3133</cvename> + <cvename>CVE-2018-3145</cvename> + <cvename>CVE-2018-3144</cvename> + <cvename>CVE-2018-3185</cvename> + <cvename>CVE-2018-3195</cvename> + <cvename>CVE-2018-3247</cvename> + <cvename>CVE-2018-3187</cvename> + <cvename>CVE-2018-3174</cvename> + <cvename>CVE-2018-3171</cvename> + <cvename>CVE-2018-3277</cvename> + <cvename>CVE-2018-3162</cvename> + <cvename>CVE-2018-3173</cvename> + <cvename>CVE-2018-3200</cvename> + <cvename>CVE-2018-3170</cvename> + <cvename>CVE-2018-3212</cvename> + <cvename>CVE-2018-3280</cvename> + <cvename>CVE-2018-3186</cvename> + <cvename>CVE-2018-3161</cvename> + <cvename>CVE-2018-3278</cvename> + <cvename>CVE-2018-3279</cvename> + <cvename>CVE-2018-3282</cvename> + <cvename>CVE-2018-3284</cvename> + <cvename>CVE-2018-3283</cvename> + <cvename>CVE-2018-3286</cvename> + </references> + <dates> + <discovery>2018-10-16</discovery> + <entry>2018-10-20</entry> + </dates> + </vuln> + <vuln vid="44864c84-d3b8-11e8-b3cb-00e04c1ea73d"> <topic>matomo -- XSS vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201810200758.w9K7whgd000635>