SUSE update for mariadb



Published: 2021-12-01

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper input validation

EUVDB-ID: #VU57511

Risk: Medium

CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35604

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote privileged user to damange or delete data.

The vulnerability exists due to improper input validation within the InnoDB component in MySQL Server. A remote privileged user can exploit this vulnerability to damange or delete data.

Mitigation

Update the affected package mariadb to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Server Applications: 15-SP2

mariadb-errormessages: before 10.4.22-3.22.1

mariadb-tools-debuginfo: before 10.4.22-3.22.1

mariadb-tools: before 10.4.22-3.22.1

mariadb-debugsource: before 10.4.22-3.22.1

mariadb-debuginfo: before 10.4.22-3.22.1

mariadb-client-debuginfo: before 10.4.22-3.22.1

mariadb-client: before 10.4.22-3.22.1

mariadb: before 10.4.22-3.22.1

libmariadbd19-debuginfo: before 10.4.22-3.22.1

libmariadbd19: before 10.4.22-3.22.1

libmariadbd-devel: before 10.4.22-3.22.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213836-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###