FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  518000
Date:      2019-11-20
Time:      10:57:40Z
Committer: zeising

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
66a770b4-e008-11dd-a765-0030843d3802mysql -- empty bit-string literal denial of service

MySQL reports:

The vulnerability is caused due to an error when processing an empty bit-string literal and can be exploited to crash the server via a specially crafted SQL statement.


Discovery 2008-09-11
Entry 2009-01-11
mysql-server
ge 5.0 lt 5.0.66

ge 5.1 lt 5.1.26

ge 6.0 lt 6.0.6

CVE-2008-3963
http://bugs.mysql.com/bug.php?id=35658
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html
http://secunia.com/advisories/31769
388d9ee4-7f22-11dd-a66a-0019666436c2mysql -- MyISAM table privileges security bypass vulnerability

SecurityFocus reports:

MySQL is prone to a security-bypass vulnerability. An attacker can exploit this issue to overwrite existing table files in the MySQL data directory, bypassing certain security restrictions.


Discovery 2008-05-05
Entry 2008-09-10
Modified 2008-10-10
mysql-server
ge 6.0 lt 6.0.5

ge 5.1 lt 5.1.24

ge 5.0 lt 5.0.67

ge 4.1 lt 4.1.22_1

29106
CVE-2008-2079
8c451386-dff3-11dd-a765-0030843d3802mysql -- privilege escalation and overwrite of the system table information

MySQL reports:

Using RENAME TABLE against a table with explicit DATA DIRECTORY and INDEX DIRECTORY options can be used to overwrite system table information by replacing the symbolic link points. the file to which the symlink points.


Discovery 2007-11-14
Entry 2009-01-11
mysql-server
ge 4.1 lt 4.1.24

ge 5.0 lt 5.0.51

ge 5.1 lt 5.1.23

ge 6.0 lt 6.0.4

CVE-2007-5969
26765
http://bugs.mysql.com/bug.php?id=32111
738f8f9e-d661-11dd-a765-0030843d3802mysql -- MyISAM table privileges security bypass vulnerability for symlinked paths

MySQL Team reports:

Additional corrections were made for the symlink-related privilege problem originally addressed. The original fix did not correctly handle the data directory pathname if it contained symlinked directories in its path, and the check was made only at table-creation time, not at table-opening time later.


Discovery 2008-07-03
Entry 2008-12-30
mysql-server
ge 4.1 lt 4.1.25

ge 5.0 lt 5.0.75

ge 5.1 lt 5.1.28

ge 6.0 lt 6.0.6

CVE-2008-2079
CVE-2008-4097
CVE-2008-4098
http://bugs.mysql.com/bug.php?id=32167
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-25.html
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-75.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-28.html
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25
66a770b4-e008-11dd-a765-0030843d3802mysql -- empty bit-string literal denial of service

MySQL reports:

The vulnerability is caused due to an error when processing an empty bit-string literal and can be exploited to crash the server via a specially crafted SQL statement.


Discovery 2008-09-11
Entry 2009-01-11
mysql-server
ge 5.0 lt 5.0.66

ge 5.1 lt 5.1.26

ge 6.0 lt 6.0.6

CVE-2008-3963
http://bugs.mysql.com/bug.php?id=35658
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html
http://secunia.com/advisories/31769
8c773d7f-6cbb-11e2-b242-c8600054b392mysql/mariadb/percona server -- multiple vulnerabilities

ORACLE reports:

Multiple SQL injection vulnerabilities in the replication code

Stack-based buffer overflow

Heap-based buffer overflow


Discovery 2012-12-01
Entry 2013-02-01
mysql-server
ge 5.1 lt 5.1.67

ge 5.5 lt 5.5.29

mariadb-server
ge 5.3 lt 5.3.12

ge 5.5 lt 5.5.29

percona-server
ge 5.5 lt 5.5.29.29.4

CVE-2012-4414
CVE-2012-5611
CVE-2012-5612
CVE-2012-5615
CVE-2012-5627
https://mariadb.atlassian.net/browse/MDEV-4029
https://mariadb.atlassian.net/browse/MDEV-MDEV-729
https://mariadb.atlassian.net/browse/MDEV-MDEV-729
http://www.mysqlperformanceblog.com/2013/01/23/announcing-percona-server-5-5-29-29-4/
388d9ee4-7f22-11dd-a66a-0019666436c2mysql -- MyISAM table privileges security bypass vulnerability

SecurityFocus reports:

MySQL is prone to a security-bypass vulnerability. An attacker can exploit this issue to overwrite existing table files in the MySQL data directory, bypassing certain security restrictions.


Discovery 2008-05-05
Entry 2008-09-10
Modified 2008-10-10
mysql-server
ge 6.0 lt 6.0.5

ge 5.1 lt 5.1.24

ge 5.0 lt 5.0.67

ge 4.1 lt 4.1.22_1

29106
CVE-2008-2079
738f8f9e-d661-11dd-a765-0030843d3802mysql -- MyISAM table privileges security bypass vulnerability for symlinked paths

MySQL Team reports:

Additional corrections were made for the symlink-related privilege problem originally addressed. The original fix did not correctly handle the data directory pathname if it contained symlinked directories in its path, and the check was made only at table-creation time, not at table-opening time later.


Discovery 2008-07-03
Entry 2008-12-30
mysql-server
ge 4.1 lt 4.1.25

ge 5.0 lt 5.0.75

ge 5.1 lt 5.1.28

ge 6.0 lt 6.0.6

CVE-2008-2079
CVE-2008-4097
CVE-2008-4098
http://bugs.mysql.com/bug.php?id=32167
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-25.html
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-75.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-28.html
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25
7fe7df75-6568-11e6-a590-14dae9d210b8End of Life Ports

These packages have reached End of Life status and/or have been removed from the Ports Tree. They may contain undocumented security issues. Please take caution and find alternative software as soon as possible.


Discovery 2016-08-18
Entry 2016-08-18
Modified 2016-10-18
python32
python31
python30
python26
python25
python24
python23
python22
python21
python20
python15
ge 0

php54
php53
php52
php5
php4
ge 0

perl5
lt 5.18

perl5.16
perl5.14
perl5.12
perl
ge 0

ruby
ruby_static
lt 2.1,1

unifi2
unifi3
ge 0

apache21
apache20
apache13
ge 0

tomcat55
tomcat41
ge 0

mysql51-client
mysql51-server
mysql50-client
mysql50-server
mysql41-client
mysql41-server
mysql40-client
mysql40-server
ge 0

postgresql90-client
postgresql90-server
postgresql84-client
postgresql84-server
postgresql83-client
postgresql83-server
postgresql82-client
postgresql82-server
postgresql81-client
postgresql81-server
postgresql80-client
postgresql80-server
postgresql74-client
postgresql74-server
postgresql73-client
postgresql73-server
postgresql72-client
postgresql72-server
postgresql71-client
postgresql71-server
postgresql7-client
postgresql7-server
ge 0

ports/211975
8c451386-dff3-11dd-a765-0030843d3802mysql -- privilege escalation and overwrite of the system table information

MySQL reports:

Using RENAME TABLE against a table with explicit DATA DIRECTORY and INDEX DIRECTORY options can be used to overwrite system table information by replacing the symbolic link points. the file to which the symlink points.


Discovery 2007-11-14
Entry 2009-01-11
mysql-server
ge 4.1 lt 4.1.24

ge 5.0 lt 5.0.51

ge 5.1 lt 5.1.23

ge 6.0 lt 6.0.4

CVE-2007-5969
26765
http://bugs.mysql.com/bug.php?id=32111