SB2026010708 - SUSE update for mariadb 



SB2026010708 - SUSE update for mariadb

Published: January 7, 2026

Security Bulletin ID SB2026010708
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 40% Low 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Insecure automated optimizations (CVE-ID: CVE-2023-52969)

The vulnerability allows a remote user to perform a denial of service attack.

The vulnerability exists due to insecure automated optimization when handling derived tables within the SELECT clause. A remote privileged user can crash the server with a specially crafted query. 


2) Insecure automated optimizations (CVE-ID: CVE-2023-52970)

The vulnerability allows a remote user to perform a denial of service attack.

The vulnerability exists due to insecure automated optimization when handling inserts from a derived table containing insert target table. A remote privileged user can crash the server with a specially crafted query. 


3) Insecure automated optimizations (CVE-ID: CVE-2023-52971)

The vulnerability allows a remote user to perform a denial of service attack.

The vulnerability exists due to insecure automated optimization in JOIN::fix_all_splittings_in_plan. A remote user can crash the database server.


4) Improper input validation (CVE-ID: CVE-2025-30693)

The vulnerability allows a remote privileged user to damange or delete data.

The vulnerability exists due to improper input validation within the InnoDB component in MySQL Server. A remote privileged user can exploit this vulnerability to damange or delete data.


5) Improper input validation (CVE-ID: CVE-2025-30722)

The vulnerability allows a remote authenticated user to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Cluster: General component in MySQL Cluster. A remote authenticated user can exploit this vulnerability to gain access to sensitive information.


Remediation

Install update from vendor's website.