[Git][security-tracker-team/security-tracker][master] CVE-2022-24048/mariadb

Bastien Roucariès (@rouca) rouca at debian.org
Tue Jul 30 12:55:00 BST 2024



Bastien Roucariès pushed to branch master at Debian Security Tracker / security-tracker


Commits:
341136ff by Bastien Roucariès at 2024-07-30T11:54:04+00:00
CVE-2022-24048/mariadb

According to upstream same fix than CVE-2022-2405[1-2]

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -197056,7 +197056,7 @@ CVE-2022-24052 (MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privil
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-366/
 	NOTE: MariaDB bug: https://jira.mariadb.org/browse/MDEV-27612
 	NOTE: Commit https://github.com/MariaDB/server/commit/2925d0f2ee
-	NOTE: According to upstream same fix than CVE-2022-24051
+	NOTE: According to upstream same fix than CVE-2022-24051, CVE-2022-24048
 CVE-2022-24051 (MariaDB CONNECT Storage Engine Format String Privilege Escalation Vuln ...)
 	- mariadb-10.6 1:10.6.7-1
 	- mariadb-10.5 <removed>
@@ -197066,7 +197066,7 @@ CVE-2022-24051 (MariaDB CONNECT Storage Engine Format String Privilege Escalatio
 	NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-318/
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-365/
-	NOTE: According to upstream same fix than CVE-2022-24052
+	NOTE: According to upstream same fix than CVE-2022-24052, CVE-2022-24048
 	NOTE: MariaDB bug: https://jira.mariadb.org/browse/MDEV-27612
 	NOTE: Commit https://github.com/MariaDB/server/commit/2925d0f2ee
 CVE-2022-24050 (MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vul ...)
@@ -197088,6 +197088,9 @@ CVE-2022-24048 (MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privi
 	[buster] - mariadb-10.3 1:10.3.34-0+deb10u1
 	NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-363/
+	NOTE: According to upstream same fix than CVE-2022-24052, CVE-2022-24051
+	NOTE: MariaDB bug: https://jira.mariadb.org/browse/MDEV-27612
+	NOTE: Commit https://github.com/MariaDB/server/commit/2925d0f2ee
 CVE-2022-24047 (This vulnerability allows remote attackers to bypass authentication on ...)
 	NOT-FOR-US: BMC Track-It!
 CVE-2022-24046 (This vulnerability allows network-adjacent attackers to execute arbitr ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/341136ff6bf4c89cf501276f5b6b96c7f989104a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/341136ff6bf4c89cf501276f5b6b96c7f989104a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240730/8024c5cd/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list