diff options
author | brnrd <brnrd@FreeBSD.org> | 2016-05-01 15:33:15 +0800 |
---|---|---|
committer | brnrd <brnrd@FreeBSD.org> | 2016-05-01 15:33:15 +0800 |
commit | 100ea96b27015ac7a56bc0ca9e2db98a7be8e981 (patch) | |
tree | 974fa45034bb75f47a489ed92a067237d150f546 /security | |
parent | 19bc07c4bc55f5805fe9010b73c72720d3927d09 (diff) | |
download | freebsd-ports-gnome-100ea96b27015ac7a56bc0ca9e2db98a7be8e981.tar.gz freebsd-ports-gnome-100ea96b27015ac7a56bc0ca9e2db98a7be8e981.tar.zst freebsd-ports-gnome-100ea96b27015ac7a56bc0ca9e2db98a7be8e981.zip |
security/vuxml: Add entry for MySQL/MariaDB/Percona April Critical Patch Update
- Add entry for 31 security fixes for Oracle MySQL
- Add also affected MariaDB packages
- Add also affected Percona packages
Reviewed by: junovitch (ports-secteam)
Approved by: junovitch (ports-secteam)
Differential Revision: D6159
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 88 |
1 files changed, 88 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 442d8dfd12f3..37b4de34999e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,94 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8c2b2f11-0ebe-11e6-b55e-b499baebfeaf"> + <topic>MySQL -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mariadb55-server</name> + <range><lt>5.5.49</lt></range> + </package> + <package> + <name>mariadb100-server</name> + <range><lt>10.0.25</lt></range> + </package> + <package> + <name>mariadb101-server</name> + <range><lt>10.1.12</lt></range> + </package> + <package> + <name>mysql55-server</name> + <range><lt>5.5.49</lt></range> + </package> + <package> + <name>mysql56-server</name> + <range><lt>5.6.30</lt></range> + </package> + <package> + <name>mysql57-server</name> + <range><lt>5.7.12</lt></range> + </package> + <package> + <name>percona55-server</name> + <range><lt>5.5.49</lt></range> + </package> + <package> + <name>percona-server</name> + <range><lt>5.6.30</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Oracle reports reports:</p> + <blockquote cite="http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL"> + <p>Critical Patch Update contains 31 new security fixes for Oracle MySQL + 5.5.48, 5.6.29, 5.7.11 and earlier</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL</url> + <url>https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/</url> + <url>https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/</url> + <url>https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/</url> + <cvename>CVE-2016-0705</cvename> + <cvename>CVE-2016-0639</cvename> + <cvename>CVE-2015-3194</cvename> + <cvename>CVE-2016-0640</cvename> + <cvename>CVE-2016-0641</cvename> + <cvename>CVE-2016-3461</cvename> + <cvename>CVE-2016-2047</cvename> + <cvename>CVE-2016-0642</cvename> + <cvename>CVE-2016-0643</cvename> + <cvename>CVE-2016-0644</cvename> + <cvename>CVE-2016-0646</cvename> + <cvename>CVE-2016-0647</cvename> + <cvename>CVE-2016-0648</cvename> + <cvename>CVE-2016-0649</cvename> + <cvename>CVE-2016-0650</cvename> + <cvename>CVE-2016-0652</cvename> + <cvename>CVE-2016-0653</cvename> + <cvename>CVE-2016-0654</cvename> + <cvename>CVE-2016-0655</cvename> + <cvename>CVE-2016-0656</cvename> + <cvename>CVE-2016-0657</cvename> + <cvename>CVE-2016-0658</cvename> + <cvename>CVE-2016-0651</cvename> + <cvename>CVE-2016-0659</cvename> + <cvename>CVE-2016-0661</cvename> + <cvename>CVE-2016-0662</cvename> + <cvename>CVE-2016-0663</cvename> + <cvename>CVE-2016-0665</cvename> + <cvename>CVE-2016-0666</cvename> + <cvename>CVE-2016-0667</cvename> + <cvename>CVE-2016-0668</cvename> + </references> + <dates> + <discovery>2016-04-19</discovery> + <entry>2016-04-30</entry> + </dates> + </vuln> + <vuln vid="f2d4f879-0d7c-11e6-925f-6805ca0b3d42"> <topic>logstash -- password disclosure vulnerability</topic> <affects> |