{"id":"MGASA-2019-0181","summary":"Updated mariadb packages fix security vulnerability","details":"Vulnerability in the MariaDB Server component of MariaDB (subcomponent:\nServer: Replication). Difficult to exploit vulnerability allows high\nprivileged attacker with network access via multiple protocols to\ncompromise MariaDB Server. Successful attacks of this vulnerability can\nresult in unauthorized ability to cause a hang or frequently repeatable\ncrash (complete DOS) of MariaDB Server (CVE-2019-2614).\n\nVulnerability in the MariaDB Server component of MariaDB (subcomponent:\nServer: Security: Privileges). Easily exploitable vulnerability allows\nhigh privileged attacker with network access via multiple protocols to\ncompromise MariaDB Server. Successful attacks of this vulnerability can\nresult in unauthorized ability to cause a hang or frequently repeatable\ncrash (complete DOS) of MariaDB Server (CVE-2019-2627).\n","modified":"2026-02-04T03:14:13.930598Z","published":"2019-05-19T11:27:30Z","related":["CVE-2019-2614","CVE-2019-2627"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0181.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=24743"},{"type":"REPORT","url":"https://mariadb.com/kb/en/library/mariadb-10139-release-notes/"},{"type":"REPORT","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL"}],"affected":[{"package":{"name":"mariadb","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/mariadb?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.1.39-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0181.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}