Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:0232

Опубликовано: 09 янв. 2026
Источник: rocky
Оценка: Important

Описание

Important: mariadb:10.11 security update

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

Security Fix(es):

  • mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation (CVE-2025-13699)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
galerax86_641.module+el8.10.0+1925+356c22e8galera-26.4.20-1.module+el8.10.0+1925+356c22e8.x86_64.rpm
Judyx86_6418.module+el8.4.0+431+26aaed18Judy-1.0.5-18.module+el8.4.0+431+26aaed18.x86_64.rpm
Judyx86_6418.module+el8.10.0+40062+b4bfe4b1Judy-1.0.5-18.module+el8.10.0+40062+b4bfe4b1.x86_64.rpm
Judyx86_6418.module+el8.10.0+1925+356c22e8Judy-1.0.5-18.module+el8.10.0+1925+356c22e8.x86_64.rpm
mariadbx86_642.module+el8.10.0+40064+062d4c63mariadb-10.11.10-2.module+el8.10.0+40064+062d4c63.x86_64.rpm
mariadb-backupx86_642.module+el8.10.0+40064+062d4c63mariadb-backup-10.11.10-2.module+el8.10.0+40064+062d4c63.x86_64.rpm
mariadb-commonx86_642.module+el8.10.0+40064+062d4c63mariadb-common-10.11.10-2.module+el8.10.0+40064+062d4c63.x86_64.rpm
mariadb-develx86_642.module+el8.10.0+40064+062d4c63mariadb-devel-10.11.10-2.module+el8.10.0+40064+062d4c63.x86_64.rpm
mariadb-embeddedx86_642.module+el8.10.0+40064+062d4c63mariadb-embedded-10.11.10-2.module+el8.10.0+40064+062d4c63.x86_64.rpm
mariadb-embedded-develx86_642.module+el8.10.0+40064+062d4c63mariadb-embedded-devel-10.11.10-2.module+el8.10.0+40064+062d4c63.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7
ubuntu
около 1 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

CVSS3: 7
nvd
около 1 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

CVSS3: 7
msrc
около 1 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability

CVSS3: 7
debian
около 1 месяца назад

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution ...

suse-cvrf
около 1 месяца назад

Security update for mariadb