GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Nov 11, 2020 12:26 pm Post subject: [ GLSA 202011-14 ] MariaDB |
|
|
Gentoo Linux Security Advisory
Title: MariaDB: Remote code execution (GLSA 202011-14)
Severity: high
Exploitable: local, remote
Date: 2020-11-11
Bug(s): #747166
ID: 202011-14
Synopsis
A vulnerability has been discovered in MariaDB which could result
in the arbitrary execution of code.
Background
MariaDB is an enhanced, drop-in replacement for MySQL.
Affected Packages
Package: dev-db/mariadb
Vulnerable: < 10.5.6
Unaffected: >= 10.5.6
Unaffected: >= 10.4.13-r3
Unaffected: >= 10.3.23-r3
Unaffected: >= 10.2.22-r3
Architectures: All supported architectures
Description
It was discovered that MariaDB did not properly validate the content of
a packet received from a server.
Impact
A remote attacker could send a specially crafted packet to WSREP
service, possibly resulting in execution of arbitrary code with the
privileges of the process or a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All MariaDB 10.5.x users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.5.6:10.5"
| All MariaDB 10.4.x users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.4.13-r3:10.4"
| All MariaDB 10.3.x users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.3.23-r3:10.3"
| All MariaDB 10.2.x users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.2.22-r3:10.2"
|
References
CVE-2020-15180 |
|