aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBernard Spil <brnrd@FreeBSD.org>2025-02-07 14:59:55 +0000
committerBernard Spil <brnrd@FreeBSD.org>2025-02-07 14:59:55 +0000
commit785522bfada9110f00fa6290531fb2a0614a3d04 (patch)
treece85cd43e8005b1377a7a796620b87159c141bf5
parent2b8ec57a7b7df4e3d54c83e5d1fb0cd5b71a1ed7 (diff)
security/vuxml: Document MariaDB InnoDB vuln
-rw-r--r--security/vuxml/vuln/2025.xml38
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 0e0d816c5a45..d237a93416e7 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,41 @@
+ <vuln vid="7bcfca95-e563-11ef-873e-8447094a420f">
+ <topic>MariaDB -- DoS vulnerability in InnoDB</topic>
+ <affects>
+ <package>
+ <name>mariadb105-server</name>
+ <range><lt>10.5.28</lt></range>
+ </package>
+ <package>
+ <name>mariadb106-server</name>
+ <range><lt>10.6.21</lt></range>
+ </package>
+ <package>
+ <name>mariadb1011-server</name>
+ <range><lt>10.11.11</lt></range>
+ </package>
+ <package>
+ <name>mariadb114-server</name>
+ <range><lt>11.4.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>MariaDB reports:</p>
+ <blockquote cite="https://mariadb.com/kb/en/security/">
+ <p>Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-21490</cvename>
+ <url>http://mariadb.com/kb/en/security/</url>
+ </references>
+ <dates>
+ <discovery>2025-02-04</discovery>
+ <entry>2025-02-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="c10b639c-e51c-11ef-9e76-4ccc6adda413">
<topic>libcaca -- Multiple vulnerabilities</topic>
<affects>