diff options
author | Bernard Spil <brnrd@FreeBSD.org> | 2025-02-07 14:59:55 +0000 |
---|---|---|
committer | Bernard Spil <brnrd@FreeBSD.org> | 2025-02-07 14:59:55 +0000 |
commit | 785522bfada9110f00fa6290531fb2a0614a3d04 (patch) | |
tree | ce85cd43e8005b1377a7a796620b87159c141bf5 | |
parent | 2b8ec57a7b7df4e3d54c83e5d1fb0cd5b71a1ed7 (diff) |
security/vuxml: Document MariaDB InnoDB vuln
-rw-r--r-- | security/vuxml/vuln/2025.xml | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 0e0d816c5a45..d237a93416e7 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,41 @@ + <vuln vid="7bcfca95-e563-11ef-873e-8447094a420f"> + <topic>MariaDB -- DoS vulnerability in InnoDB</topic> + <affects> + <package> + <name>mariadb105-server</name> + <range><lt>10.5.28</lt></range> + </package> + <package> + <name>mariadb106-server</name> + <range><lt>10.6.21</lt></range> + </package> + <package> + <name>mariadb1011-server</name> + <range><lt>10.11.11</lt></range> + </package> + <package> + <name>mariadb114-server</name> + <range><lt>11.4.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>MariaDB reports:</p> + <blockquote cite="https://mariadb.com/kb/en/security/"> + <p>Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-21490</cvename> + <url>http://mariadb.com/kb/en/security/</url> + </references> + <dates> + <discovery>2025-02-04</discovery> + <entry>2025-02-07</entry> + </dates> + </vuln> + <vuln vid="c10b639c-e51c-11ef-9e76-4ccc6adda413"> <topic>libcaca -- Multiple vulnerabilities</topic> <affects> |