SB2022021432 - Slackware Linux update for mariadb



SB2022021432 - Slackware Linux update for mariadb

Published: February 14, 2022

Security Bulletin ID SB2022021432
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 60% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2021-46661)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE). A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


2) Input validation error (CVE-ID: CVE-2021-46663)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to ha_maria::extra application crash via certain SELECT statements. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


3) NULL pointer dereference (CVE-ID: CVE-2021-46664)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the sub_select_postjoin_aggr() function. A remote user can pass specially crafted data to the application and perform a denial of service (DoS) attack.


4) Input validation error (CVE-ID: CVE-2021-46665)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect used_tables expectations in the sql_parse.cc. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


5) Resource exhaustion (CVE-ID: CVE-2021-46668)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote user can trigger resource exhaustion via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.


Remediation

Install update from vendor's website.