- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201711-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: MariaDB, MySQL: Root privilege escalation Date: November 10, 2017 Bugs: #635704, #635706 ID: 201711-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability was discovered in MariaDB and MySQL which may allow local users to gain root privileges. Background ========== MySQL is a popular multi-threaded, multi-user SQL server. MariaDB is an enhanced, drop-in replacement for MySQL. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-db/mariadb < 10.0.30-r1 >= 10.0.30-r1 2 dev-db/mysql < 5.6.36-r1 >= 5.6.36-r1 ------------------------------------------------------------------- 2 affected packages Description =========== The Gentoo installation scripts before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link. Impact ====== A local attacker could escalate privileges to root. Workaround ========== There is no known workaround at this time. Resolution ========== All MariaDB users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.0.30-r1" All MySQL users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.6.36-r1" References ========== [ 1 ] CVE-2017-15945 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15945 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201711-04 Concerns? =========