SUSE update for mariadb



Published: 2021-12-30

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper input validation

EUVDB-ID: #VU57511

Risk: Medium

CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35604

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote privileged user to damange or delete data.

The vulnerability exists due to improper input validation within the InnoDB component in MySQL Server. A remote privileged user can exploit this vulnerability to damange or delete data.

Mitigation

Update the affected package mariadb to the latest version.

Vulnerable software versions

SUSE OpenStack Cloud Crowbar: 9

SUSE Linux Enterprise Server for SAP: 12-SP4

SUSE Linux Enterprise Server: 12-SP4-LTSS - 12-SP5

SUSE OpenStack Cloud: 9

mariadb-errormessages: before 10.2.41-3.44.3

mariadb-tools-debuginfo: before 10.2.41-3.44.3

mariadb-tools: before 10.2.41-3.44.3

mariadb-galera: before 10.2.41-3.44.3

mariadb-debugsource: before 10.2.41-3.44.3

mariadb-debuginfo: before 10.2.41-3.44.3

mariadb-client-debuginfo: before 10.2.41-3.44.3

mariadb-client: before 10.2.41-3.44.3

mariadb: before 10.2.41-3.44.3

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20214202-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###