Buffer Overflow Affecting mariadb package, versions <1:5.5.47-1.el7_2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-MARIADB-2064301
- published 26 Jul 2021
- disclosed 20 Jan 2015
Introduced: 20 Jan 2015
CVE-2016-0546 Open this link in a new tabHow to fix?
Upgrade Centos:7 mariadb to version 1:5.5.47-1.el7_2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream mariadb package and not the mariadb package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
References
- http://www.securityfocus.com/bid/81066
- https://bugzilla.redhat.com/show_bug.cgi?id=1301493
- https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html
- https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html
- https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://access.redhat.com/security/cve/CVE-2016-0546
- http://www.debian.org/security/2016/dsa-3453
- http://www.debian.org/security/2016/dsa-3459
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- https://access.redhat.com/errata/RHSA-2016:0534
- http://www.securitytracker.com/id/1034708
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.ubuntu.com/usn/USN-2881-1