git: 785522bfada9 - main - security/vuxml: Document MariaDB InnoDB vuln
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 07 Feb 2025 14:59:57 UTC
The branch main has been updated by brnrd: URL: https://cgit.FreeBSD.org/ports/commit/?id=785522bfada9110f00fa6290531fb2a0614a3d04 commit 785522bfada9110f00fa6290531fb2a0614a3d04 Author: Bernard Spil <brnrd@FreeBSD.org> AuthorDate: 2025-02-07 14:59:55 +0000 Commit: Bernard Spil <brnrd@FreeBSD.org> CommitDate: 2025-02-07 14:59:55 +0000 security/vuxml: Document MariaDB InnoDB vuln --- security/vuxml/vuln/2025.xml | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 0e0d816c5a45..d237a93416e7 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,41 @@ + <vuln vid="7bcfca95-e563-11ef-873e-8447094a420f"> + <topic>MariaDB -- DoS vulnerability in InnoDB</topic> + <affects> + <package> + <name>mariadb105-server</name> + <range><lt>10.5.28</lt></range> + </package> + <package> + <name>mariadb106-server</name> + <range><lt>10.6.21</lt></range> + </package> + <package> + <name>mariadb1011-server</name> + <range><lt>10.11.11</lt></range> + </package> + <package> + <name>mariadb114-server</name> + <range><lt>11.4.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>MariaDB reports:</p> + <blockquote cite="https://mariadb.com/kb/en/security/"> + <p>Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-21490</cvename> + <url>http://mariadb.com/kb/en/security/</url> + </references> + <dates> + <discovery>2025-02-04</discovery> + <entry>2025-02-07</entry> + </dates> + </vuln> + <vuln vid="c10b639c-e51c-11ef-9e76-4ccc6adda413"> <topic>libcaca -- Multiple vulnerabilities</topic> <affects>