SB2018012222 - Fedora 27 update for community-mysql
Published: January 22, 2018 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 18 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2018-2696)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote unauthenticated attacker can exploit the vulnerability to perform a denial of service attack.
2) Improper input validation (CVE-ID: CVE-2018-2703)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
3) Improper input validation (CVE-ID: CVE-2018-2565)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
4) Improper input validation (CVE-ID: CVE-2018-2573)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
5) Improper input validation (CVE-ID: CVE-2018-2576)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
6) Improper input validation (CVE-ID: CVE-2018-2583)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
7) Improper input validation (CVE-ID: CVE-2018-2586)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
8) Improper input validation (CVE-ID: CVE-2018-2590)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
9) Improper input validation (CVE-ID: CVE-2018-2600)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
10) Improper Access Control (CVE-ID: CVE-2018-2612)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify or delete certain data in database.
11) Improper input validation (CVE-ID: CVE-2018-2622)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
12) Improper input validation (CVE-ID: CVE-2018-2640)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
13) Information Exposure (CVE-ID: CVE-2018-2645)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to gain access to sensitive information.
14) Improper input validation (CVE-ID: CVE-2018-2646)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
15) Improper Access Control (CVE-ID: CVE-2018-2647)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to modify certain data on the system and perform a denial of service (DoS) attack.
16) Improper input validation (CVE-ID: CVE-2018-2665)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
17) Improper input validation (CVE-ID: CVE-2018-2667)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote privileged user can exploit the vulnerability to perform a denial of service attack.
18) Improper input validation (CVE-ID: CVE-2018-2668)
The vulnerability exists due to an unspecified error in the MySQL Server. A remote authenticated attacker can exploit the vulnerability to perform a denial of service attack.
Remediation
Install update from vendor's website.