From owner-svn-ports-head@freebsd.org Fri Jan 19 12:44:22 2018 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B3C24ED3F42; Fri, 19 Jan 2018 12:44:22 +0000 (UTC) (envelope-from brnrd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8B7977FE74; Fri, 19 Jan 2018 12:44:22 +0000 (UTC) (envelope-from brnrd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id B672459A7; Fri, 19 Jan 2018 12:44:21 +0000 (UTC) (envelope-from brnrd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id w0JCiL13090727; Fri, 19 Jan 2018 12:44:21 GMT (envelope-from brnrd@FreeBSD.org) Received: (from brnrd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id w0JCiC37090722; Fri, 19 Jan 2018 12:44:12 GMT (envelope-from brnrd@FreeBSD.org) Message-Id: <201801191244.w0JCiC37090722@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: brnrd set sender to brnrd@FreeBSD.org using -f From: Bernard Spil Date: Fri, 19 Jan 2018 12:44:12 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r459408 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: brnrd X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 459408 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 Jan 2018 12:44:22 -0000 Author: brnrd Date: Fri Jan 19 12:44:12 2018 New Revision: 459408 URL: https://svnweb.freebsd.org/changeset/ports/459408 Log: security/vuxml: Document 2018Q1 Oracle MySQL vulns Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jan 19 12:33:27 2018 (r459407) +++ head/security/vuxml/vuln.xml Fri Jan 19 12:44:12 2018 (r459408) @@ -58,6 +58,113 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + MySQL -- multiple vulnerabilities + + + mariadb55-server + 5.5.59 + + + mariadb100-server + 10.0.34 + + + mariadb101-server + 10.1.31 + + + mariadb102-server + 10.2.13 + + + mysql55-server + 5.5.59 + + + mysql56-server + 5.6.39 + + + mysql57-server + 5.7.21 + + + percona55-server + 5.5.59 + + + percona56-server + 5.6.39 + + + percona57-server + 5.7.21 + + + + +

Oracle reports:

+
+

Not all vulnerabilities are relevant for all flavors/versions of the + servers and clients

+
    +
  • Vulnerability allows low privileged attacker with network access + via multiple protocols to compromise MySQL Server. Successful attacks + of this vulnerability can result in unauthorized ability to cause a + hang or frequently repeatable crash (complete DOS) of MySQL Server. + GIS: CVE-2018-2573, DDL CVE-2018-2622, Optimizer: CVE-2018-2640, + CVE-2018-2665, CVE-2018-2668, Security:Privileges: CVE-2018-2703, + Partition: CVE-2018-2562.
  • +
  • Vulnerability allows high privileged attacker with network access + via multiple protocols to compromise MySQL Server. Successful attacks + of this vulnerability can result in unauthorized ability to cause a + hang or frequently repeatable crash (complete DOS) of MySQL Server. + InnoDB: CVE-2018-2565, CVE-2018-2612 DML: CVE-2018-2576, + CVE-2018-2646, Stored Procedure: CVE-2018-2583, Performance Schema: + CVE-2018-2590, Partition: CVE-2018-2591, Optimizer: CVE-2018-2600, + CVE-2018-2667, Security:Privileges: CVE-2018-2696, Replication: + CVE-2018-2647.
  • +
  • Vulnerability allows a low or high privileged attacker with network + access via multiple protocols to compromise MySQL Server with + unauthorized creation, deletion, modification or access to data/ + critical data. InnoDB: CVE-2018-2612, Performance Schema: + CVE-2018-2645, Replication: CVE-2018-2647, Partition: CVE-2018-2562. +
  • +
+
+ +
+ + http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL + https://mariadb.com/kb/en/library/mariadb-5559-release-notes/ + CVE-2018-2562 + CVE-2018-2565 + CVE-2018-2573 + CVE-2018-2576 + CVE-2018-2583 + CVE-2018-2586 + CVE-2018-2590 + CVE-2018-2591 + CVE-2018-2600 + CVE-2018-2612 + CVE-2018-2622 + CVE-2018-2640 + CVE-2018-2645 + CVE-2018-2646 + CVE-2018-2647 + CVE-2018-2665 + CVE-2018-2667 + CVE-2018-2668 + CVE-2018-2696 + CVE-2018-2703 + + + 2017-01-18 + 2018-01-19 + +
+ wordpress -- multiple issues @@ -140350,5 +140457,3 @@ misc.c:
- -