Uploaded image for project: 'MariaDB Server'
  1. MariaDB Server
  2. MDEV-36581

a NULL pointer dereference vulnerability located in the function select_value_catcher::setup at sql/opt_subselect.cc:6044

    XMLWordPrintable

Details

    • Bug
    • Status: Closed (View Workflow)
    • Critical
    • Resolution: Duplicate
    • 11.4.0
    • N/A
    • Optimizer
    • None
    • ubuntu20.04,x86
    • Not for Release Notes

    Description

      This is a NULL pointer dereference vulnerability in MariaDB located in the function select_value_catcher::setup at sql/opt_subselect.cc:6044. The function is called during the optimization of a semi-join involving a subquery, specifically in execute_degenerate_jtbm_semi_join(). The items parameter is nullptr, but the function assumes it is a valid pointer, leading to a segmentation fault. An attacker can trigger this by crafting a malicious UPDATE or SELECT query with certain semi-join patterns, resulting in a denial-of-service (DoS).

      Attachments

        Issue Links

          Activity

            People

              Unassigned Unassigned
              yx yx
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved:

                Git Integration

                  Error rendering 'com.xiplink.jira.git.jira_git_plugin:git-issue-webpanel'. Please contact your Jira administrators.