Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 434874 - <dev-db/mariadb-{5.1.66,5.5.28a}: Multiple Denial of Service Vulnerabilities
Summary: <dev-db/mariadb-{5.1.66,5.5.28a}: Multiple Denial of Service Vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/50485/
Whiteboard: ~3 [cleanup]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-09-13 09:26 UTC by Agostino Sarubbo
Modified: 2013-01-21 23:07 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2012-09-13 09:26:37 UTC
From secunia advisory at $URL:

Description
Some vulnerabilities have been reported in MariaDB, which can be exploited by malicious users to cause a DoS (Denial of Service).

1) A NULL pointer dereference error within the "test_if_skip_sort_order()" function (sql_select.cc) when executing subqueries can be exploited to crash the service via a specially crafted query.

2) An error exists within the "select_describe()" function (sql/sql_select.cc) when handling certain subqueries, which frees certain currently used tables and can be exploited to cause a crash via a specially crafted query.

3) An error when handling the query cache when running parallel queries can be exploited to cause a crash via specially crafted queries run in parallel.

The vulnerabilities are reported in version 5.5.25. Other versions may also be affected.


Solution
Fixed in development version 5.5.27.
Comment 1 Agostino Sarubbo gentoo-dev 2012-11-30 12:02:29 UTC
From https://secunia.com/advisories/51443/ :

Description
A vulnerability have been reported in MariaDB, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

The vulnerability is caused due to an unspecified error and can be exploited to cause a buffer overflow.

Successful exploitation may allow execution of arbitrary code with privileges of the mysqld daemon.

The vulnerability is reported in versions prior to 5.1.66, 5.2.13, 5.3.11, and 5.5.28a.


Solution
Update to version 5.1.66, 5.2.13, 5.3.11, or 5.5.28a.


The status remanins in [ebuild]
Comment 2 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2013-01-20 02:50:39 UTC
InCVS.

No GLSA needed due to no stable versions.

security: you can close
Comment 3 Sean Amoss (RETIRED) gentoo-dev Security 2013-01-21 22:51:05 UTC
(In reply to comment #2)
> security: you can close

Please cleanup vulnerable versions first.
Comment 4 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2013-01-21 23:07:03 UTC
I would prefer not to help users test older versions, but I have in this case.