emacs-bug-tracker
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

bug#47257: closed (mariadb is vulnerable to CVE-2021-27928 (RCE))


From: GNU bug Tracking System
Subject: bug#47257: closed (mariadb is vulnerable to CVE-2021-27928 (RCE))
Date: Fri, 26 Mar 2021 01:24:02 +0000

Your message dated Fri, 26 Mar 2021 02:23:47 +0100
with message-id <9e630e7cec836881b4842129a396f23fdab2f5e0.camel@zaclys.net>
and subject line Re: bug#47257: [PATCH v3] gnu: mariadb: Fix CVE-2021-27928.
has caused the debbugs.gnu.org bug report #47257,
regarding mariadb is vulnerable to CVE-2021-27928 (RCE)
to be marked as done.

(If you believe you have received this mail in error, please contact
help-debbugs@gnu.org.)


-- 
47257: http://debbugs.gnu.org/cgi/bugreport.cgi?bug=47257
GNU Bug Tracking System
Contact help-debbugs@gnu.org with problems
--- Begin Message --- Subject: mariadb is vulnerable to CVE-2021-27928 (RCE) Date: Fri, 19 Mar 2021 11:25:31 +0100 User-agent: Evolution 3.34.2
CVE-2021-27928  04:15
A remote code execution issue was discovered in MariaDB 10.2 before
10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before
10.5.9; Percona Server through 2021-03-03; and the wsrep patch through
2021-03-03 for MySQL. An untrusted search path leads to eval injection,
in which a database SUPER user can execute OS commands after modifying
wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an
Oracle product.

From https://jira.mariadb.org/browse/MDEV-25179 it looks like 10.5.9
fixes it for us since we package 10.5.8 currently.

However:

$ ./pre-inst-env guix refresh -l mariadb
Building the following 552 packages would ensure 1047 dependent
packages are rebuilt:
[..]

Is it possible to graft mariadb you think? I am thinking this issue
doesnt need updating of the "lib" output which is what's causing the
high number of dependents AIUI. I am not sure we could actually update
individual outputs right now though. Might be a good idea to split the
packages for the future.

Léo

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---
--- Begin Message --- Subject: Re: bug#47257: [PATCH v3] gnu: mariadb: Fix CVE-2021-27928. Date: Fri, 26 Mar 2021 02:23:47 +0100 User-agent: Evolution 3.34.2
On Thu, 2021-03-25 at 21:16 -0400, Mark H Weaver wrote:
> 
> Looks good to me.  Please push.  Thank you!
> 
>      Mark

Thank you for the review, pushed as
52c8d07a4f7033534a71ac7efeec21a65d35c125.

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---

reply via email to

[Prev in Thread] Current Thread [Next in Thread]