security/vuxml: Document MySQL quarterly vulns
This commit is contained in:
parent
b91b345b19
commit
f5387ff86c
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=516329
@ -58,6 +58,106 @@ Notes:
|
||||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="fc91f2ef-fd7b-11e9-a1c7-b499baebfeaf">
|
||||
<topic>MySQL -- Multiple vulerabilities</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>mariadb55-server</name>
|
||||
<range><lt>5.5.66</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>mariadb101-server</name>
|
||||
<range><lt>10.1.42</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>mariadb102-server</name>
|
||||
<range><lt>10.2.28</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>mariadb103-server</name>
|
||||
<range><lt>10.3.19</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>mariadb104-server</name>
|
||||
<range><lt>10.4.9</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>mysql56-server</name>
|
||||
<range><lt>5.6.46</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>mysql57-server</name>
|
||||
<range><lt>5.7.28</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>mysql80-server</name>
|
||||
<range><lt>8.0.18</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>percona55-server</name>
|
||||
<range><lt>5.5.66</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>percona56-server</name>
|
||||
<range><lt>5.6.46</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>percona57-server</name>
|
||||
<range><lt>5.7.28</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Oracle reports:</p>
|
||||
<blockquote cite="https://www.oracle.com/security-alerts/cpuoct2019.html">
|
||||
<p>This Critical Patch Update contains 31 new security fixes for
|
||||
Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable
|
||||
without authentication, i.e., may be exploited over a network without
|
||||
requiring user credentials.
|
||||
</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>https://www.oracle.com/security-alerts/cpuoct2019.html</url>
|
||||
<cvename>CVE-2019-5443</cvename>
|
||||
<cvename>CVE-2019-1543</cvename>
|
||||
<cvename>CVE-2019-3011</cvename>
|
||||
<cvename>CVE-2019-2966</cvename>
|
||||
<cvename>CVE-2019-2967</cvename>
|
||||
<cvename>CVE-2019-2974</cvename>
|
||||
<cvename>CVE-2019-2946</cvename>
|
||||
<cvename>CVE-2019-3004</cvename>
|
||||
<cvename>CVE-2019-2914</cvename>
|
||||
<cvename>CVE-2019-2969</cvename>
|
||||
<cvename>CVE-2019-2991</cvename>
|
||||
<cvename>CVE-2019-2920</cvename>
|
||||
<cvename>CVE-2019-2993</cvename>
|
||||
<cvename>CVE-2019-2922</cvename>
|
||||
<cvename>CVE-2019-2923</cvename>
|
||||
<cvename>CVE-2019-2924</cvename>
|
||||
<cvename>CVE-2019-2963</cvename>
|
||||
<cvename>CVE-2019-2968</cvename>
|
||||
<cvename>CVE-2019-3003</cvename>
|
||||
<cvename>CVE-2019-2997</cvename>
|
||||
<cvename>CVE-2019-2948</cvename>
|
||||
<cvename>CVE-2019-2950</cvename>
|
||||
<cvename>CVE-2019-2982</cvename>
|
||||
<cvename>CVE-2019-2998</cvename>
|
||||
<cvename>CVE-2019-2960</cvename>
|
||||
<cvename>CVE-2019-2957</cvename>
|
||||
<cvename>CVE-2019-2938</cvename>
|
||||
<cvename>CVE-2019-3018</cvename>
|
||||
<cvename>CVE-2019-3009</cvename>
|
||||
<cvename>CVE-2019-2910</cvename>
|
||||
<cvename>CVE-2019-2911</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2019-10-15</discovery>
|
||||
<entry>2019-11-02</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="381deebb-f5c9-11e9-9c4f-74d435e60b7c">
|
||||
<topic>file -- Heap buffer overflow possible</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user