summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBernard Spil <brnrd@FreeBSD.org>2023-11-26 18:28:38 +0100
committerBernard Spil <brnrd@FreeBSD.org>2023-11-26 18:28:38 +0100
commit743222a924569d7ed3d5f74cf2dda3fd326fe143 (patch)
tree9b20105bed9d9dd6a35e1c9a33509c81e32dfff6
parentdevel/py-wheel: Update to 0.42.0 (diff)
security/vuxml: Document MariaDB vulnerability
-rw-r--r--security/vuxml/vuln/2023.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index f4c94f3b7c4e..3fba51d4c6e7 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,43 @@
+ <vuln vid="388e6557-8c80-11ee-9ee3-84a93843eb75">
+ <topic>MariaDB -- Denial-of-Service vulnerability</topic>
+ <affects>
+ <package>
+ <name>mariadb105-server</name>
+ <range><lt>10.5.23</lt></range>
+ </package>
+ <package>
+ <name>mariadb106-server</name>
+ <range><lt>10.6.16</lt></range>
+ </package>
+ <package>
+ <name>mariadb1011-server</name>
+ <range><lt>10.11.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The MariaDB project reports:</p>
+ <blockquote cite="https://mariadb.com/kb/en/mariadb-10-11-6-release-notes/">
+ <p>Easily exploitable vulnerability allows high privileged attacker
+ with network access via multiple protocols to compromise MySQL
+ Server. Successful attacks of this vulnerability can result in
+ unauthorized ability to cause a hang or frequently repeatable crash
+ (complete DOS) of MySQL Server.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2023-22084</cvename>
+ <url>https://mariadb.com/kb/en/mariadb-10-11-6-release-notes/</url>
+ <url>https://mariadb.com/kb/en/mariadb-10-6-16-release-notes/</url>
+ <url>https://mariadb.com/kb/en/mariadb-10-5-23-release-notes/</url>
+ </references>
+ <dates>
+ <discovery>2023-11-13</discovery>
+ <entry>2023-11-26</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a62c0c50-8aa0-11ee-ac0d-00e0670f2660">
<topic>strongSwan -- vulnerability in charon-tkm</topic>
<affects>