diff options
author | brnrd <brnrd@FreeBSD.org> | 2018-10-20 15:58:43 +0800 |
---|---|---|
committer | brnrd <brnrd@FreeBSD.org> | 2018-10-20 15:58:43 +0800 |
commit | f999dc4adc0b402556e5f5996954253450e7143c (patch) | |
tree | d9c8a41e9fc03c255adce4f30cac11eda2f9a6f8 /security | |
parent | 47b91216cfae9f95d36f07c1ebdf99bb52d655f2 (diff) | |
download | freebsd-ports-gnome-f999dc4adc0b402556e5f5996954253450e7143c.tar.gz freebsd-ports-gnome-f999dc4adc0b402556e5f5996954253450e7143c.tar.zst freebsd-ports-gnome-f999dc4adc0b402556e5f5996954253450e7143c.zip |
security/vuxml: Document 2018-10 MySQL vulnerabilities
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 101 |
1 files changed, 101 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 944600586382..4c8bb9cb6c77 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,107 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ec5072b0-d43a-11e8-a6d2-b499baebfeaf"> + <topic>MySQL -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mariadb55-server</name> + <range><lt>5.5.62</lt></range> + </package> + <package> + <name>mariadb100-server</name> + <range><lt>10.0.37</lt></range> + </package> + <package> + <name>mariadb101-server</name> + <range><lt>10.1.37</lt></range> + </package> + <package> + <name>mariadb102-server</name> + <range><lt>10.2.19</lt></range> + </package> + <package> + <name>mariadb103-server</name> + <range><lt>10.3.10</lt></range> + </package> + <package> + <name>mysql55-server</name> + <range><lt>5.5.62</lt></range> + </package> + <package> + <name>mysql56-server</name> + <range><lt>5.6.42</lt></range> + </package> + <package> + <name>mysql57-server</name> + <range><lt>5.7.24</lt></range> + </package> + <package> + <name>mysql80-server</name> + <range><lt>8.0.13</lt></range> + </package> + <package> + <name>percona55-server</name> + <range><lt>5.5.62</lt></range> + </package> + <package> + <name>percona56-server</name> + <range><lt>5.6.42</lt></range> + </package> + <package> + <name>percona57-server</name> + <range><lt>5.7.24</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Oracle reports:</p> + <blockquote cite="https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL"> + <p>Please reference CVE/URL list for details</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL</url> + <cvename>CVE-2016-9843</cvename> + <cvename>CVE-2018-3155</cvename> + <cvename>CVE-2018-3143</cvename> + <cvename>CVE-2018-3156</cvename> + <cvename>CVE-2018-3251</cvename> + <cvename>CVE-2018-3182</cvename> + <cvename>CVE-2018-3137</cvename> + <cvename>CVE-2018-3203</cvename> + <cvename>CVE-2018-3133</cvename> + <cvename>CVE-2018-3145</cvename> + <cvename>CVE-2018-3144</cvename> + <cvename>CVE-2018-3185</cvename> + <cvename>CVE-2018-3195</cvename> + <cvename>CVE-2018-3247</cvename> + <cvename>CVE-2018-3187</cvename> + <cvename>CVE-2018-3174</cvename> + <cvename>CVE-2018-3171</cvename> + <cvename>CVE-2018-3277</cvename> + <cvename>CVE-2018-3162</cvename> + <cvename>CVE-2018-3173</cvename> + <cvename>CVE-2018-3200</cvename> + <cvename>CVE-2018-3170</cvename> + <cvename>CVE-2018-3212</cvename> + <cvename>CVE-2018-3280</cvename> + <cvename>CVE-2018-3186</cvename> + <cvename>CVE-2018-3161</cvename> + <cvename>CVE-2018-3278</cvename> + <cvename>CVE-2018-3279</cvename> + <cvename>CVE-2018-3282</cvename> + <cvename>CVE-2018-3284</cvename> + <cvename>CVE-2018-3283</cvename> + <cvename>CVE-2018-3286</cvename> + </references> + <dates> + <discovery>2018-10-16</discovery> + <entry>2018-10-20</entry> + </dates> + </vuln> + <vuln vid="44864c84-d3b8-11e8-b3cb-00e04c1ea73d"> <topic>matomo -- XSS vulnerability</topic> <affects> |