diff options
author | Bernard Spil <brnrd@FreeBSD.org> | 2023-11-26 18:28:38 +0100 |
---|---|---|
committer | Bernard Spil <brnrd@FreeBSD.org> | 2023-11-26 18:28:38 +0100 |
commit | 743222a924569d7ed3d5f74cf2dda3fd326fe143 (patch) | |
tree | 9b20105bed9d9dd6a35e1c9a33509c81e32dfff6 | |
parent | devel/py-wheel: Update to 0.42.0 (diff) |
security/vuxml: Document MariaDB vulnerability
-rw-r--r-- | security/vuxml/vuln/2023.xml | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index f4c94f3b7c4e..3fba51d4c6e7 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,43 @@ + <vuln vid="388e6557-8c80-11ee-9ee3-84a93843eb75"> + <topic>MariaDB -- Denial-of-Service vulnerability</topic> + <affects> + <package> + <name>mariadb105-server</name> + <range><lt>10.5.23</lt></range> + </package> + <package> + <name>mariadb106-server</name> + <range><lt>10.6.16</lt></range> + </package> + <package> + <name>mariadb1011-server</name> + <range><lt>10.11.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The MariaDB project reports:</p> + <blockquote cite="https://mariadb.com/kb/en/mariadb-10-11-6-release-notes/"> + <p>Easily exploitable vulnerability allows high privileged attacker + with network access via multiple protocols to compromise MySQL + Server. Successful attacks of this vulnerability can result in + unauthorized ability to cause a hang or frequently repeatable crash + (complete DOS) of MySQL Server.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-22084</cvename> + <url>https://mariadb.com/kb/en/mariadb-10-11-6-release-notes/</url> + <url>https://mariadb.com/kb/en/mariadb-10-6-16-release-notes/</url> + <url>https://mariadb.com/kb/en/mariadb-10-5-23-release-notes/</url> + </references> + <dates> + <discovery>2023-11-13</discovery> + <entry>2023-11-26</entry> + </dates> + </vuln> + <vuln vid="a62c0c50-8aa0-11ee-ac0d-00e0670f2660"> <topic>strongSwan -- vulnerability in charon-tkm</topic> <affects> |