Package | mariadb-10.1 |
---|---|
Version | 10.1.48-0+deb9u3 (stretch) |
Related CVEs | CVE-2021-2154 CVE-2021-2166 CVE-2021-2194 CVE-2021-2389 CVE-2021-46657 CVE-2021-46661 CVE-2021-46663 CVE-2021-46664 CVE-2021-46665 CVE-2021-46666 CVE-2021-46667 CVE-2021-46668 CVE-2021-46669 |
Multiple vulnerabilities were fixed in MariaDB, a popular database server.
CVE-2021-2154
An easily exploitable vulnerability related to the UDF_INIT()
function, used by MariaDB allows
high privileged attacker with network access via multiple
protocols to compromise MariaDB Server.
Successful attacks of this vulnerability can result
in unauthorized ability to cause the server to hang or frequently
repeatable crashes.
CVE-2021-2166
MySQL's SET plug-in variables wrongly locked making it possible for
high privileged attackers with network access to compromise the MariaDB
server, potentially causing Denial-of-Service (DoS).
CVE-2021-2194
Incorrect handling of filters related to full-text search could be used by
remote attackers to cause MariaDB Server to crash.
CVE-2021-2389
Incorrect handling of SELECT and UPDATE queries on tables with full-text
indices may cause out-of-memory errors.
CVE-2021-46657
get_sort_by_table in MariaDB could be used to cause an
application crash via certain subquery uses of ORDER BY.
CVE-2021-46661
Incorrect handling of find functions in tables and lists makes it possible
to cause a DoS.
CVE-2021-46663
Incorrect handling of certain SELECT statements made it possible to crash
the MariaDB server by the use of ha_maria::extra application.
CVE-2021-46664
MariaDB crash in sub_select_postjoin_aggr for a NULL value of aggr.
CVE-2021-46665
Incorrect handling of used_tables makes it possible to cause MariaDB to crash.
CVE-2021-46666
Mishandling of HAVING and WHERE clauses allows attacker to produce a DoS.
CVE-2021-46667
Integer overflow in sql_lex.cc may yield to an application crash.
CVE-2021-46668
MariaDB crash via certain long
SELECT DISTINCT statements that improperly interact with
storage-engine resource limitations for temporary data structures.
CVE-2021-46669
convert_const_to_int use-after-free when the BIGINT data type is used.
For Debian 9 stretch, these problems have been fixed in version 10.1.48-0+deb9u3.
We recommend that you upgrade your mariadb-10.1 packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.