[SSA:2023-318-01] mariadb
New mariadb packages are available for Slackware 15.0 and -current to
fix a security issue.
Here are the details from the Slackware 15.0 ChangeLog
patches/packages/mariadb-10.5.23-i586-1_slack15.0.txz: Upgraded.
This update fixes bugs and a security issue:
Vulnerability allows high privileged attacker with network access via
multiple protocols to compromise the server. Successful attacks of this
vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/mariadb-10.5.23-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/mariadb-10.5.23-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/mariadb-10.11.5-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/mariadb-10.11.6-x86_64-1.txz
MD5 signatures
Slackware 15.0 package:
82195d80fd47e92a363de02bd73f2778 mariadb-10.5.23-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
82d1585d0c51add5b732d41877a97174 mariadb-10.5.23-x86_64-1_slack15.0.txz
Slackware -current package:
70dbbc338fcff0e18fee0efbb797727c ap/mariadb-10.11.5-i586-1.txz
Slackware x86_64 -current package:
089f5e1b4ec9be1f1bf763e14d129448 ap/mariadb-10.11.6-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg mariadb-10.5.23-i586-1_slack15.0.txz
Then, restart the database server:
# sh /etc/rc.d/rc.mysqld restart
Package | Affected Version |
---|---|
pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-current | < 10.11.6 |
pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-15.0 | < 10.5.23 |
pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-current | < 10.11.5 |
pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-15.0 | < 10.5.23 |
- ID
- SSA:2023-318-01
- Severity
- medium
- Severity from
- CVE-2023-22084
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2023&m=slackware-security.367032
- Published
-
2023-11-14T21:30:56
(10 months ago) - Modified
-
2023-11-14T21:30:56
(10 months ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALPINE:CVE-2023-22084
- ALSA-2024:0894
- ALSA-2024:1141
- ELSA-2024-0894
- ELSA-2024-1141
- FEDORA-2023-2eca0baace
- FEDORA-2023-7fe02ec473
- FEDORA-2023-bff42b29eb
- FREEBSD:22DF5074-71CD-11EE-85EB-84A93843EB75
- FREEBSD:388E6557-8C80-11EE-9EE3-84A93843EB75
- RHSA-2024:0894
- RHSA-2024:1141
- SUSE-SU-2023:4907-1
- SUSE-SU-2023:4908-1
- SUSE-SU-2024:1922-1
- SUSE-SU-2024:1985-1
- USN-6459-1
- USN-6583-1
- USN-6600-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-current | slackware | mariadb | < 10.11.6 | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-15.0 | slackware | mariadb | < 10.5.23 | slackware64-15.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-current | slackware | mariadb | < 10.11.5 | slackware-current | i586 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-15.0 | slackware | mariadb | < 10.5.23 | slackware-15.0 | i586 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |