svn commit: r516329 - head/security/vuxml
Bernard Spil
brnrd at FreeBSD.org
Sat Nov 2 14:33:45 UTC 2019
Author: brnrd
Date: Sat Nov 2 14:33:44 2019
New Revision: 516329
URL: https://svnweb.freebsd.org/changeset/ports/516329
Log:
security/vuxml: Document MySQL quarterly vulns
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Nov 2 14:14:04 2019 (r516328)
+++ head/security/vuxml/vuln.xml Sat Nov 2 14:33:44 2019 (r516329)
@@ -58,6 +58,106 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="fc91f2ef-fd7b-11e9-a1c7-b499baebfeaf">
+ <topic>MySQL -- Multiple vulerabilities</topic>
+ <affects>
+ <package>
+ <name>mariadb55-server</name>
+ <range><lt>5.5.66</lt></range>
+ </package>
+ <package>
+ <name>mariadb101-server</name>
+ <range><lt>10.1.42</lt></range>
+ </package>
+ <package>
+ <name>mariadb102-server</name>
+ <range><lt>10.2.28</lt></range>
+ </package>
+ <package>
+ <name>mariadb103-server</name>
+ <range><lt>10.3.19</lt></range>
+ </package>
+ <package>
+ <name>mariadb104-server</name>
+ <range><lt>10.4.9</lt></range>
+ </package>
+ <package>
+ <name>mysql56-server</name>
+ <range><lt>5.6.46</lt></range>
+ </package>
+ <package>
+ <name>mysql57-server</name>
+ <range><lt>5.7.28</lt></range>
+ </package>
+ <package>
+ <name>mysql80-server</name>
+ <range><lt>8.0.18</lt></range>
+ </package>
+ <package>
+ <name>percona55-server</name>
+ <range><lt>5.5.66</lt></range>
+ </package>
+ <package>
+ <name>percona56-server</name>
+ <range><lt>5.6.46</lt></range>
+ </package>
+ <package>
+ <name>percona57-server</name>
+ <range><lt>5.7.28</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Oracle reports:</p>
+ <blockquote cite="https://www.oracle.com/security-alerts/cpuoct2019.html">
+ <p>This Critical Patch Update contains 31 new security fixes for
+ Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable
+ without authentication, i.e., may be exploited over a network without
+ requiring user credentials.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.oracle.com/security-alerts/cpuoct2019.html</url>
+ <cvename>CVE-2019-5443</cvename>
+ <cvename>CVE-2019-1543</cvename>
+ <cvename>CVE-2019-3011</cvename>
+ <cvename>CVE-2019-2966</cvename>
+ <cvename>CVE-2019-2967</cvename>
+ <cvename>CVE-2019-2974</cvename>
+ <cvename>CVE-2019-2946</cvename>
+ <cvename>CVE-2019-3004</cvename>
+ <cvename>CVE-2019-2914</cvename>
+ <cvename>CVE-2019-2969</cvename>
+ <cvename>CVE-2019-2991</cvename>
+ <cvename>CVE-2019-2920</cvename>
+ <cvename>CVE-2019-2993</cvename>
+ <cvename>CVE-2019-2922</cvename>
+ <cvename>CVE-2019-2923</cvename>
+ <cvename>CVE-2019-2924</cvename>
+ <cvename>CVE-2019-2963</cvename>
+ <cvename>CVE-2019-2968</cvename>
+ <cvename>CVE-2019-3003</cvename>
+ <cvename>CVE-2019-2997</cvename>
+ <cvename>CVE-2019-2948</cvename>
+ <cvename>CVE-2019-2950</cvename>
+ <cvename>CVE-2019-2982</cvename>
+ <cvename>CVE-2019-2998</cvename>
+ <cvename>CVE-2019-2960</cvename>
+ <cvename>CVE-2019-2957</cvename>
+ <cvename>CVE-2019-2938</cvename>
+ <cvename>CVE-2019-3018</cvename>
+ <cvename>CVE-2019-3009</cvename>
+ <cvename>CVE-2019-2910</cvename>
+ <cvename>CVE-2019-2911</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-15</discovery>
+ <entry>2019-11-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="381deebb-f5c9-11e9-9c4f-74d435e60b7c">
<topic>file -- Heap buffer overflow possible</topic>
<affects>
More information about the svn-ports-all
mailing list