Gentoo Archives: gentoo-announce

From: Sam James <sam@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202011-14 ] MariaDB: Remote code execution
Date: Wed, 11 Nov 2020 04:06:24
Message-Id: 96E383AD-C0C7-47B0-92BF-4689BADB029C@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202011-14
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: MariaDB: Remote code execution
9 Date: November 11, 2020
10 Bugs: #747166
11 ID: 202011-14
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been discovered in MariaDB which could result in
19 the arbitrary execution of code.
20
21 Background
22 ==========
23
24 MariaDB is an enhanced, drop-in replacement for MySQL.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 dev-db/mariadb < 10.5.6 >= 10.5.6:10.5
33 >= 10.4.13-r3:10.4
34 >= 10.3.23-r3:10.3
35 >= 10.2.22-r3:10.2
36
37 Description
38 ===========
39
40 It was discovered that MariaDB did not properly validate the content of
41 a packet received from a server.
42
43 Impact
44 ======
45
46 A remote attacker could send a specially crafted packet to WSREP
47 service, possibly resulting in execution of arbitrary code with the
48 privileges of the process or a Denial of Service condition.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All MariaDB 10.5.x users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.5.6:10.5"
62
63 All MariaDB 10.4.x users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.4.13-r3:10.4"
67
68 All MariaDB 10.3.x users should upgrade to the latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.3.23-r3:10.3"
72
73 All MariaDB 10.2.x users should upgrade to the latest version:
74
75 # emerge --sync
76 # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.2.22-r3:10.2"
77
78 References
79 ==========
80
81 [ 1 ] CVE-2020-15180
82 https://nvd.nist.gov/vuln/detail/CVE-2020-15180
83
84 Availability
85 ============
86
87 This GLSA and any updates to it are available for viewing at
88 the Gentoo Security Website:
89
90 https://security.gentoo.org/glsa/202011-14
91
92 Concerns?
93 =========
94
95 Security is a primary focus of Gentoo Linux and ensuring the
96 confidentiality and security of our users' machines is of utmost
97 importance to us. Any security concerns should be addressed to
98 security@g.o or alternatively, you may file a bug at
99 https://bugs.gentoo.org.
100
101 License
102 =======
103
104 Copyright 2020 Gentoo Foundation, Inc; referenced text
105 belongs to its owner(s).
106
107 The contents of this document are licensed under the
108 Creative Commons - Attribution / Share Alike license.
109
110 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature