diff options
author | Repository mirror & CI <repomirrorci@gentoo.org> | 2020-11-11 04:05:33 +0000 |
---|---|---|
committer | Repository mirror & CI <repomirrorci@gentoo.org> | 2020-11-11 04:05:33 +0000 |
commit | 8b1cb1f832a0847b50b7e1cd11cad66cc449a435 (patch) | |
tree | 624670446392a7fab79367b78c19e32abc34cf38 /metadata/glsa/glsa-202011-14.xml | |
parent | 2020-11-11 01:35:28 UTC (diff) | |
parent | [ GLSA 202011-14 ] MariaDB: Remote code execution (diff) | |
download | gentoo-8b1cb1f832a0847b50b7e1cd11cad66cc449a435.tar.gz gentoo-8b1cb1f832a0847b50b7e1cd11cad66cc449a435.tar.bz2 gentoo-8b1cb1f832a0847b50b7e1cd11cad66cc449a435.zip |
Merge commit '85d2754949c49070bea44df8f904e9e985c57532' into master
Diffstat (limited to 'metadata/glsa/glsa-202011-14.xml')
-rw-r--r-- | metadata/glsa/glsa-202011-14.xml | 74 |
1 files changed, 74 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202011-14.xml b/metadata/glsa/glsa-202011-14.xml new file mode 100644 index 000000000000..2ae7a8c2ec92 --- /dev/null +++ b/metadata/glsa/glsa-202011-14.xml @@ -0,0 +1,74 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202011-14"> + <title>MariaDB: Remote code execution</title> + <synopsis>A vulnerability has been discovered in MariaDB which could result + in the arbitrary execution of code. + </synopsis> + <product type="ebuild">mariadb</product> + <announced>2020-11-11</announced> + <revised count="1">2020-11-11</revised> + <bug>747166</bug> + <access>local, remote</access> + <affected> + <package name="dev-db/mariadb" auto="yes" arch="*"> + <unaffected range="ge" slot="10.5">10.5.6</unaffected> + <unaffected range="ge" slot="10.4">10.4.13-r3</unaffected> + <unaffected range="ge" slot="10.3">10.3.23-r3</unaffected> + <unaffected range="ge" slot="10.2">10.2.22-r3</unaffected> + <vulnerable range="lt">10.5.6</vulnerable> + </package> + </affected> + <background> + <p>MariaDB is an enhanced, drop-in replacement for MySQL.</p> + </background> + <description> + <p>It was discovered that MariaDB did not properly validate the content of + a packet received from a server. + </p> + </description> + <impact type="high"> + <p>A remote attacker could send a specially crafted packet to WSREP + service, possibly resulting in execution of arbitrary code with the + privileges of the process or a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All MariaDB 10.5.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.5.6:10.5" + </code> + + <p>All MariaDB 10.4.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.4.13-r3:10.4" + </code> + + <p>All MariaDB 10.3.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.3.23-r3:10.3" + </code> + + <p>All MariaDB 10.2.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.2.22-r3:10.2" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15180">CVE-2020-15180</uri> + </references> + <metadata tag="requester" timestamp="2020-11-08T21:17:21Z">whissi</metadata> + <metadata tag="submitter" timestamp="2020-11-11T03:38:51Z">whissi</metadata> +</glsa> |