Advisories ยป MGASA-2018-0335

Updated mariadb packages fix security vulnerabilities

Publication date: 12 Aug 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-3058 , CVE-2018-3063 , CVE-2018-3064 , CVE-2018-3066

Description

Updated mariadb packages fix security vulnerabilities:

Vulnerability in the MariaDB Server component of MariaDB (subcomponent:
MyISAM). Easily exploitable vulnerability allows low privileged attacker
with network access via multiple protocols to compromise MariaDB Server.
Successful attacks of this vulnerability can result in unauthorized
update, insert or delete access to some of MariaDB Server accessible
data (CVE-2018-3058).

Vulnerability in the MariaDB Server component of MariaDB (subcomponent:
Server: Security: Privileges). Easily exploitable vulnerability allows
high privileged attacker with network access via multiple protocols to
compromise MariaDB Server. Successful attacks of this vulnerability can
result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MariaDB Server (CVE-2018-3063).

Vulnerability in the MariaDB Server component of MariaDB (subcomponent:
InnoDB). Easily exploitable vulnerability allows low privileged attacker
with network access via multiple protocols to compromise MariaDB Server.
Successful attacks of this vulnerability can result in unauthorized
ability to cause a hang or frequently repeatable crash (complete DOS) of
MariaDB Server as well as unauthorized update, insert or delete access
to some of MariaDB Server accessible data (CVE-2018-3064).

Vulnerability in the MariaDB Server component of MariaDB (subcomponent:
Server: Options). Difficult to exploit vulnerability allows high
privileged attacker with network access via multiple protocols to 
compromise MariaDB Server. Successful attacks of this vulnerability can
result in unauthorized update, insert or delete access to some of MariaDB
Server accessible data as well as unauthorized read access to a subset of
MariaDB Server accessible data (CVE-2018-3066).
                

References

SRPMS

6/core