aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorbrnrd <brnrd@FreeBSD.org>2018-10-20 15:58:43 +0800
committerbrnrd <brnrd@FreeBSD.org>2018-10-20 15:58:43 +0800
commitf999dc4adc0b402556e5f5996954253450e7143c (patch)
treed9c8a41e9fc03c255adce4f30cac11eda2f9a6f8 /security
parent47b91216cfae9f95d36f07c1ebdf99bb52d655f2 (diff)
downloadfreebsd-ports-gnome-f999dc4adc0b402556e5f5996954253450e7143c.tar.gz
freebsd-ports-gnome-f999dc4adc0b402556e5f5996954253450e7143c.tar.zst
freebsd-ports-gnome-f999dc4adc0b402556e5f5996954253450e7143c.zip
security/vuxml: Document 2018-10 MySQL vulnerabilities
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml101
1 files changed, 101 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 944600586382..4c8bb9cb6c77 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,107 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="ec5072b0-d43a-11e8-a6d2-b499baebfeaf">
+ <topic>MySQL -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mariadb55-server</name>
+ <range><lt>5.5.62</lt></range>
+ </package>
+ <package>
+ <name>mariadb100-server</name>
+ <range><lt>10.0.37</lt></range>
+ </package>
+ <package>
+ <name>mariadb101-server</name>
+ <range><lt>10.1.37</lt></range>
+ </package>
+ <package>
+ <name>mariadb102-server</name>
+ <range><lt>10.2.19</lt></range>
+ </package>
+ <package>
+ <name>mariadb103-server</name>
+ <range><lt>10.3.10</lt></range>
+ </package>
+ <package>
+ <name>mysql55-server</name>
+ <range><lt>5.5.62</lt></range>
+ </package>
+ <package>
+ <name>mysql56-server</name>
+ <range><lt>5.6.42</lt></range>
+ </package>
+ <package>
+ <name>mysql57-server</name>
+ <range><lt>5.7.24</lt></range>
+ </package>
+ <package>
+ <name>mysql80-server</name>
+ <range><lt>8.0.13</lt></range>
+ </package>
+ <package>
+ <name>percona55-server</name>
+ <range><lt>5.5.62</lt></range>
+ </package>
+ <package>
+ <name>percona56-server</name>
+ <range><lt>5.6.42</lt></range>
+ </package>
+ <package>
+ <name>percona57-server</name>
+ <range><lt>5.7.24</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Oracle reports:</p>
+ <blockquote cite="https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL">
+ <p>Please reference CVE/URL list for details</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL</url>
+ <cvename>CVE-2016-9843</cvename>
+ <cvename>CVE-2018-3155</cvename>
+ <cvename>CVE-2018-3143</cvename>
+ <cvename>CVE-2018-3156</cvename>
+ <cvename>CVE-2018-3251</cvename>
+ <cvename>CVE-2018-3182</cvename>
+ <cvename>CVE-2018-3137</cvename>
+ <cvename>CVE-2018-3203</cvename>
+ <cvename>CVE-2018-3133</cvename>
+ <cvename>CVE-2018-3145</cvename>
+ <cvename>CVE-2018-3144</cvename>
+ <cvename>CVE-2018-3185</cvename>
+ <cvename>CVE-2018-3195</cvename>
+ <cvename>CVE-2018-3247</cvename>
+ <cvename>CVE-2018-3187</cvename>
+ <cvename>CVE-2018-3174</cvename>
+ <cvename>CVE-2018-3171</cvename>
+ <cvename>CVE-2018-3277</cvename>
+ <cvename>CVE-2018-3162</cvename>
+ <cvename>CVE-2018-3173</cvename>
+ <cvename>CVE-2018-3200</cvename>
+ <cvename>CVE-2018-3170</cvename>
+ <cvename>CVE-2018-3212</cvename>
+ <cvename>CVE-2018-3280</cvename>
+ <cvename>CVE-2018-3186</cvename>
+ <cvename>CVE-2018-3161</cvename>
+ <cvename>CVE-2018-3278</cvename>
+ <cvename>CVE-2018-3279</cvename>
+ <cvename>CVE-2018-3282</cvename>
+ <cvename>CVE-2018-3284</cvename>
+ <cvename>CVE-2018-3283</cvename>
+ <cvename>CVE-2018-3286</cvename>
+ </references>
+ <dates>
+ <discovery>2018-10-16</discovery>
+ <entry>2018-10-20</entry>
+ </dates>
+ </vuln>
+
<vuln vid="44864c84-d3b8-11e8-b3cb-00e04c1ea73d">
<topic>matomo -- XSS vulnerability</topic>
<affects>