MariaDB: Remote code execution — GLSA 202011-14

A vulnerability has been discovered in MariaDB which could result in the arbitrary execution of code.

Affected packages

dev-db/mariadb on all architectures
Affected versions < 10.5.6
Unaffected versions >= 10.5.6
>= 10.4.13-r3
>= 10.3.23-r3
>= 10.2.22-r3

Background

MariaDB is an enhanced, drop-in replacement for MySQL.

Description

It was discovered that MariaDB did not properly validate the content of a packet received from a server.

Impact

A remote attacker could send a specially crafted packet to WSREP service, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All MariaDB 10.5.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.5.6:10.5"
 

All MariaDB 10.4.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.4.13-r3:10.4"
 

All MariaDB 10.3.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.3.23-r3:10.3"
 

All MariaDB 10.2.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.2.22-r3:10.2"
 

References

Release date
November 11, 2020

Latest revision
November 11, 2020: 1

Severity
high

Exploitable
local, remote

Bugzilla entries