Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 4 Aug 2021 08:11:06 GMT
From:      Bernard Spil <brnrd@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 7583b9a0d9d0 - main - security/vuxml: Mark MariaDB vulnerable
Message-ID:  <202108040811.1748B67T079925@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by brnrd:

URL: https://cgit.FreeBSD.org/ports/commit/?id=7583b9a0d9d0445f225d5f511fdd3f83db0e6f51

commit 7583b9a0d9d0445f225d5f511fdd3f83db0e6f51
Author:     Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2021-08-04 08:10:56 +0000
Commit:     Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2021-08-04 08:10:56 +0000

    security/vuxml: Mark MariaDB vulnerable
---
 security/vuxml/vuln-2021.xml | 52 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 52 insertions(+)

diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index b4a482f88b4c..bad459317b22 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -636,6 +636,18 @@ In limited circumstances it was possible for users to authenticate using variati
 	<name>mysql80-server</name>
 	<range><lt>8.0.26</lt></range>
       </package>
+      <package>
+	<name>mariadb103-server</name>
+	<range><lt>10.3.31</lt></range>
+      </package>
+      <package>
+	<name>mariadb104-server</name>
+	<range><lt>10.4.21</lt></range>
+      </package>
+      <package>
+	<name>mariadb105-server</name>
+	<range><lt>10.5.12</lt></range>
+      </package>
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
@@ -647,15 +659,55 @@ In limited circumstances it was possible for users to authenticate using variati
 	    requiring user credentials.<br/>
 	    The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle
 	    MySQL is 8.8.</p>
+	  <p>MariaDB is affected by CVE-2021-2372 and CVE-2021-2389 only.</p>
 	</blockquote>
       </body>
     </description>
     <references>
       <url>https://www.oracle.com/security-alerts/cpujul2021.html</url>;
+      <cvename>CVE-2019-17543</cvename>
+      <cvename>CVE-2021-2339</cvename>
+      <cvename>CVE-2021-2340</cvename>
+      <cvename>CVE-2021-2342</cvename>
+      <cvename>CVE-2021-2352</cvename>
+      <cvename>CVE-2021-2354</cvename>
+      <cvename>CVE-2021-2356</cvename>
+      <cvename>CVE-2021-2357</cvename>
+      <cvename>CVE-2021-2367</cvename>
+      <cvename>CVE-2021-2370</cvename>
+      <cvename>CVE-2021-2372</cvename>
+      <cvename>CVE-2021-2374</cvename>
+      <cvename>CVE-2021-2383</cvename>
+      <cvename>CVE-2021-2384</cvename>
+      <cvename>CVE-2021-2385</cvename>
+      <cvename>CVE-2021-2387</cvename>
+      <cvename>CVE-2021-2389</cvename>
+      <cvename>CVE-2021-2390</cvename>
+      <cvename>CVE-2021-2399</cvename>
+      <cvename>CVE-2021-2402</cvename>
+      <cvename>CVE-2021-2410</cvename>
+      <cvename>CVE-2021-2411</cvename>
+      <cvename>CVE-2021-2412</cvename>
+      <cvename>CVE-2021-2417</cvename>
+      <cvename>CVE-2021-2418</cvename>
+      <cvename>CVE-2021-2422</cvename>
+      <cvename>CVE-2021-2424</cvename>
+      <cvename>CVE-2021-2425</cvename>
+      <cvename>CVE-2021-2426</cvename>
+      <cvename>CVE-2021-2427</cvename>
+      <cvename>CVE-2021-2429</cvename>
+      <cvename>CVE-2021-2437</cvename>
+      <cvename>CVE-2021-2440</cvename>
+      <cvename>CVE-2021-2441</cvename>
+      <cvename>CVE-2021-2444</cvename>
+      <cvename>CVE-2021-3450</cvename>
+      <cvename>CVE-2021-22884</cvename>
+      <cvename>CVE-2021-22901</cvename>
     </references>
     <dates>
       <discovery>2021-07-20</discovery>
       <entry>2021-07-20</entry>
+      <modified>2021-08-04</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202108040811.1748B67T079925>