From owner-svn-ports-head@freebsd.org Sat Apr 21 09:07:09 2018 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 98ACAFB1458; Sat, 21 Apr 2018 09:07:09 +0000 (UTC) (envelope-from brnrd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4E8E67CE20; Sat, 21 Apr 2018 09:07:09 +0000 (UTC) (envelope-from brnrd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4963D24E6D; Sat, 21 Apr 2018 09:07:09 +0000 (UTC) (envelope-from brnrd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id w3L979m9015860; Sat, 21 Apr 2018 09:07:09 GMT (envelope-from brnrd@FreeBSD.org) Received: (from brnrd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id w3L978B2015859; Sat, 21 Apr 2018 09:07:08 GMT (envelope-from brnrd@FreeBSD.org) Message-Id: <201804210907.w3L978B2015859@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: brnrd set sender to brnrd@FreeBSD.org using -f From: Bernard Spil Date: Sat, 21 Apr 2018 09:07:08 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r467864 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: brnrd X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 467864 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Apr 2018 09:07:09 -0000 Author: brnrd Date: Sat Apr 21 09:07:08 2018 New Revision: 467864 URL: https://svnweb.freebsd.org/changeset/ports/467864 Log: security/vuxml: Document MySQL vulns from quarterly Oracle CPU Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Apr 21 09:03:45 2018 (r467863) +++ head/security/vuxml/vuln.xml Sat Apr 21 09:07:08 2018 (r467864) @@ -58,6 +58,154 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + MySQL -- multiple vulnerabilities + + + mariadb55-server + 5.5.60 + + + mariadb100-server + 10.0.35 + + + mariadb101-server + 10.1.33 + + + mariadb102-server + 10.2.15 + + + mysql55-server + 5.5.60 + + + mysql56-server + 5.6.40 + + + mysql57-server + 5.7.22 + + + percona55-server + 5.5.60 + + + percona56-server + 5.6.40 + + + percona57-server + 5.7.22 + + + + +

Oracle reports:

+
+

MySQL Multiple Flaws Let Remote Authenticated Users Access and + Modify Data, Remote and Local Users Deny Service, and Local Users + Access Data and Gain Elevated Privileges

+
    +
  • A local user can exploit a flaw in the Replication component + to gain elevated privileges [CVE-2018-2755].
  • +
  • A remote authenticated user can exploit a flaw in the GIS + Extension component to cause denial of service conditions + [CVE-2018-2805].
  • +
  • A remote authenticated user can exploit a flaw in the InnoDB + component to cause denial of service conditions [CVE-2018-2782, + CVE-2018-2784, CVE-2018-2819].
  • +
  • A remote authenticated user can exploit a flaw in the Security + Privileges component to cause denial of service conditions + [CVE-2018-2758, CVE-2018-2818].
  • +
  • A remote authenticated user can exploit a flaw in the DDL + component to cause denial of service conditions + [CVE-2018-2817].
  • +
  • A remote authenticated user can exploit a flaw in the Optimizer + component to cause denial of service conditions [CVE-2018-2775, + CVE-2018-2778, CVE-2018-2779, CVE-2018-2780, CVE-2018-2781, + CVE-2018-2816].
  • +
  • A remote user can exploit a flaw in the Client programs + component to cause denial of service conditions [CVE-2018-2761, + CVE-2018-2773].
  • +
  • A remote authenticated user can exploit a flaw in the InnoDB + component to partially modify data and cause denial of service + conditions [CVE-2018-2786, CVE-2018-2787].
  • +
  • A remote authenticated user can exploit a flaw in the Optimizer + component to partially modify data and cause denial of service + conditions [CVE-2018-2812].
  • +
  • A local user can exploit a flaw in the Cluster ndbcluster/plugin + component to cause denial of service conditions [CVE-2018-2877]. +
  • +
  • A remote authenticated user can exploit a flaw in the InnoDB + component to cause denial of service conditions [CVE-2018-2759, + CVE-2018-2766, CVE-2018-2777, CVE-2018-2810].
  • +
  • A remote authenticated user can exploit a flaw in the DML + component to cause denial of service conditions [CVE-2018-2839]. +
  • +
  • A remote authenticated user can exploit a flaw in the + Performance Schema component to cause denial of service conditions + [CVE-2018-2846].
  • +
  • A remote authenticated user can exploit a flaw in the Pluggable + Auth component to cause denial of service conditions + [CVE-2018-2769].
  • +
  • A remote authenticated user can exploit a flaw in the Group + Replication GCS component to cause denial of service conditions + [CVE-2018-2776].
  • +
  • A local user can exploit a flaw in the Connection component to + cause denial of service conditions [CVE-2018-2762].
  • +
  • A remote authenticated user can exploit a flaw in the Locking + component to cause denial of service conditions [CVE-2018-2771]. +
  • +
  • A remote authenticated user can exploit a flaw in the DDL + component to partially access data [CVE-2018-2813].
  • +
+
+ +
+ + http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html + CVE-2018-2755 + CVE-2018-2805 + CVE-2018-2782 + CVE-2018-2784 + CVE-2018-2819 + CVE-2018-2758 + CVE-2018-2817 + CVE-2018-2775 + CVE-2018-2780 + CVE-2018-2761 + CVE-2018-2786 + CVE-2018-2787 + CVE-2018-2812 + CVE-2018-2877 + CVE-2018-2759 + CVE-2018-2766 + CVE-2018-2777 + CVE-2018-2810 + CVE-2018-2818 + CVE-2018-2839 + CVE-2018-2778 + CVE-2018-2779 + CVE-2018-2781 + CVE-2018-2816 + CVE-2018-2846 + CVE-2018-2769 + CVE-2018-2776 + CVE-2018-2762 + CVE-2018-2771 + CVE-2018-2813 + CVE-2018-2773 + + + 2018-04-17 + 2018-04-21 + +
+ wordpress -- multiple issues