This package uses eclasses which were vulnerable to root privilege escalation via "chown", see bug 630822 for details. The eclasses were fixed, however a rev bump is required to ensure that the vulnerability is completely removed.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=8f9f34e3c825f97e487e9aa0782621231810c702 commit 8f9f34e3c825f97e487e9aa0782621231810c702 Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2017-10-28 18:05:54 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2017-10-28 18:10:50 +0000 dev-db/mariadb: Rev bump to fix CVE-2017-15945 Bug: https://bugs.gentoo.org/635704 Package-Manager: Portage-2.3.13, Repoman-2.3.4 RepoMan-Options: --force dev-db/mariadb/mariadb-10.0.30-r1.ebuild | 212 ++++++++++++++++++++++++++++ dev-db/mariadb/mariadb-10.0.32-r1.ebuild | 209 ++++++++++++++++++++++++++++ dev-db/mariadb/mariadb-10.1.24-r1.ebuild | 227 ++++++++++++++++++++++++++++++ dev-db/mariadb/mariadb-10.1.26-r1.ebuild | 228 +++++++++++++++++++++++++++++++ 4 files changed, 876 insertions(+)}
All done, repository is clean. New GLSA request filed.
This issue was resolved and addressed in GLSA 201711-04 at https://security.gentoo.org/glsa/201711-04 by GLSA coordinator Aaron Bauman (b-man).