Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 28 May 2023 09:09:53 GMT
From:      Bernard Spil <brnrd@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: c27afccfc0aa - main - security/vuxml: Document MariaDB vulnerability
Message-ID:  <202305280909.34S99r1a073044@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by brnrd:

URL: https://cgit.FreeBSD.org/ports/commit/?id=c27afccfc0aadc29c3f50c6ddb78c5e1caf6d265

commit c27afccfc0aadc29c3f50c6ddb78c5e1caf6d265
Author:     Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2023-05-28 09:09:37 +0000
Commit:     Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2023-05-28 09:09:37 +0000

    security/vuxml: Document MariaDB vulnerability
---
 security/vuxml/vuln/2023.xml | 43 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 43 insertions(+)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index c078d37f795f..22aa815503d2 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,46 @@
+  <vuln vid="5d1b1a0a-fd36-11ed-a0d1-84a93843eb75">
+    <topic>MariaDB -- Nullpointer dereference</topic>
+    <affects>
+      <package>
+	<name>mariadb1011-server</name>
+	<range><lt>10.11.3</lt></range>
+      </package>
+      <package>
+	<name>mariadb106-server</name>
+	<range><lt>10.6.13</lt></range>
+      </package>
+      <package>
+	<name>mariadb105-server</name>
+	<range><lt>10.5.20</lt></range>
+      </package>
+      <package>
+	<name>mariadb104-server</name>
+	<range><lt>10.4.29</lt></range>
+      </package>
+      <package>
+	<name>mariadb103-server</name>
+	<range><lt>10.3.39</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The MariaDB project reports:</p>
+	<blockquote cite="https://mariadb.com/kb/en/security/">;
+	  <p>MariaDB Server is vulnerable to Denial of Service. It is possible for
+	    function spider_db_mbase::print_warnings to dereference a null pointer.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2022-47015</cvename>
+      <url>https://mariadb.com/kb/en/security/</url>;
+    </references>
+    <dates>
+      <discovery>2023-05-10</discovery>
+      <entry>2023-05-28</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="7d6be8d4-f812-11ed-a7ff-589cfc0f81b0">
     <topic>phpmyfaq -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202305280909.34S99r1a073044>