Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Jul 2015 20:46:04 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r391952 - head/security/vuxml
Message-ID:  <201507132046.t6DKk4ak062946@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Mon Jul 13 20:46:04 2015
New Revision: 391952
URL: https://svnweb.freebsd.org/changeset/ports/391952

Log:
  Document CVE-2015-3152 "BACKRONYM" vulnerability
  
  PHP resolved in recent releases
  MySQL has fixed in 5.7 branch and did not backport to older branches
  MariaDB resolved in 5.5.44 and 10.0.20
  Percona has not included a fix in any release (5.1, 5.5, or 5.6)
  
  Security:	CVE-2015-3152

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Jul 13 20:27:49 2015	(r391951)
+++ head/security/vuxml/vuln.xml	Mon Jul 13 20:46:04 2015	(r391952)
@@ -58,6 +58,67 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="36bd352d-299b-11e5-86ff-14dae9d210b8">
+    <topic>mysql -- SSL Downgrade</topic>
+    <affects>
+      <package>
+	<name>php56-mysql</name>
+	<name>php56-mysqli</name>
+	<range><lt>5.6.11</lt></range>
+      </package>
+      <package>
+	<name>php55-mysql</name>
+	<name>php55-mysqli</name>
+	<range><lt>5.5.27</lt></range>
+      </package>
+      <package>
+	<name>php54-mysql</name>
+	<name>php54-mysqli</name>
+	<range><lt>5.4.43</lt></range>
+      </package>
+      <package>
+	<name>mariadb-server</name>
+	<name>mysql51-server</name>
+	<name>mysql55-server</name>
+	<name>mysql56-server</name>
+	<name>percona55-server</name>
+	<name>percona56-server</name>
+	<range><ge>0</ge></range>
+      </package>
+      <package>
+	<name>mariadb55</name>
+	<range><lt>5.5.44</lt></range>
+      </package>
+      <package>
+	<name>mariadb10</name>
+	<range><lt>10.0.20</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Duo Security reports:</p>
+	<blockquote cite="INSERT URL HERE">
+	  <p>Researchers have identified a serious vulnerability in some
+	    versions of Oracle’s MySQL database product that allows an attacker to
+	    strip SSL/TLS connections of their security wrapping transparently.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://bugs.php.net/bug.php?id=69669</url>;
+      <url>https://www.duosecurity.com/blog/backronym-mysql-vulnerability</url>;
+      <url>http://www.ocert.org/advisories/ocert-2015-003.html</url>;
+      <url>https://mariadb.atlassian.net/browse/MDEV-7937</url>;
+      <url>https://mariadb.com/kb/en/mariadb/mariadb-10020-changelog/</url>;
+      <url>https://mariadb.com/kb/en/mariadb/mariadb-5544-changelog/</url>;
+      <cvename>CVE-2015-3152</cvename>
+    </references>
+    <dates>
+      <discovery>2015-03-20</discovery>
+      <entry>2015-07-13</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="81326883-2905-11e5-a4a5-002590263bf5">
     <topic>devel/ipython -- CSRF possible remote execution vulnerability</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201507132046.t6DKk4ak062946>