Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 25 |
CVE-ID | CVE-2021-46669 CVE-2022-21427 CVE-2022-27376 CVE-2022-27377 CVE-2022-27378 CVE-2022-27379 CVE-2022-27380 CVE-2022-27381 CVE-2022-27382 CVE-2022-27383 CVE-2022-27384 CVE-2022-27386 CVE-2022-27387 CVE-2022-27444 CVE-2022-27445 CVE-2022-27446 CVE-2022-27447 CVE-2022-27448 CVE-2022-27449 CVE-2022-27451 CVE-2022-27452 CVE-2022-27455 CVE-2022-27456 CVE-2022-27457 CVE-2022-27458 |
CWE-ID | CWE-416 CWE-20 CWE-89 CWE-119 CWE-120 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openSUSE Leap Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system SUSE Linux Enterprise Module for Server Applications Operating systems & Components / Operating system SUSE Linux Enterprise Module for Packagehub Subpackages Operating systems & Components / Operating system package or component mariadb-galera Operating systems & Components / Operating system package or component mariadb-errormessages Operating systems & Components / Operating system package or component mariadb-tools-debuginfo Operating systems & Components / Operating system package or component mariadb-tools Operating systems & Components / Operating system package or component mariadb-test-debuginfo Operating systems & Components / Operating system package or component mariadb-test Operating systems & Components / Operating system package or component mariadb-rpm-macros Operating systems & Components / Operating system package or component mariadb-debugsource Operating systems & Components / Operating system package or component mariadb-debuginfo Operating systems & Components / Operating system package or component mariadb-client-debuginfo Operating systems & Components / Operating system package or component mariadb-client Operating systems & Components / Operating system package or component mariadb-bench-debuginfo Operating systems & Components / Operating system package or component mariadb-bench Operating systems & Components / Operating system package or component mariadb Operating systems & Components / Operating system package or component libmariadbd19-debuginfo Operating systems & Components / Operating system package or component libmariadbd19 Operating systems & Components / Operating system package or component libmariadbd-devel Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 25 vulnerabilities.
EUVDB-ID: #VU63827
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-46669
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the convert_const_to_int() function when processing BIGINT data type. A remote attacker can trigger use-after-free error and perform a denial of service attack.
MitigationUpdate the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62418
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-21427
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote privileged user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Server: FTS component in MySQL Server. A remote privileged user can exploit this vulnerability to perform a denial of service (DoS) attack.
MitigationUpdate the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63507
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27376
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the Item_args::walk_arg() function. A remote user can pass specially crafted SQL statements and cause a denial of service.
MitigationUpdate the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63508
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27377
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the Item_func_in::cleanup() function. A remote user can pass specially crafted SQL statements and cause a denial of service.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63510
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27378
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Create_tmp_table::finalize() function. A remote user can send specially crafted SQL statements to the affected application and perform a denial of service attack.
MitigationUpdate the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63512
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27379
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Arg_comparator::compare_real() function. A remote user can send specially crafted SQL statements to the affected application and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63514
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27380
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to insufficient sanitization of user-supplied data in the my_decimal::operator=() function. A remote user can send specially crafted SQL statements to the affected application and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63515
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27381
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Field::set_default() function. A remote user can send specially crafted SQL statements to the affected application and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63516
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27382
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a segmentation fault via the Item_field::used_tables/update_depend_map_for_order() function. A remote user can send specially crafted data and perform a denial of service (DoS) attack.
MitigationUpdate the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63517
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27383
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the my_strcasecmp_8bit component. A remote user can pass specially crafted SQL statements and cause a denial of service.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63519
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27384
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Item_subselect::init_expr_cache_tracker() function. A remote user can send specially crafted SQL statements to the affected application and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63520
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27386
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to segmentation fault via the sql/sql_class.cc component. A remote user can send specially crafted data and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63521
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27387
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to buffer overflow error in the decimal_bin_size component. A remote user can send specially crafted SQL statements to the affected application, trigger buffer overflow error and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63523
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27444
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to segmentation fault via the sql/item_subselect.cc component. A remote user can send specially crafted data and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63525
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27445
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to segmentation fault via the sql/sql_window.cc component. A remote user can send specially crafted data and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63526
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27446
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to segmentation fault via the sql/item_cmpfunc.h component. A remote user can send specially crafted data and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63529
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27447
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to use-after-free error via the Binary_string::free_buffer() function in the /sql/sql_string.h component. A remote user can send specially crafted data and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63531
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27448
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a buffer overflow in the BTR_PCUR_ON() function in the /row/row0mysql.cc component. A remote user can send a specially crafted data and perform a denial of service (DoS) attack.
MitigationUpdate the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63532
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27449
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to segmentation fault via the sql/item_func.cc:148 component. A remote user can send specially crafted data and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63534
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27451
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to segmentation fault via the sql/field_conv.cc component. A remote user can send specially crafted data and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63536
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27452
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to segmentation fault via the sql/item_cmpfunc.cc component. A remote user can send specially crafted data and perform a denial of service attack.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63538
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27455
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the my_wildcmp_8bit_impl component at /strings/ctype-simple.c. A remote user can pass specially crafted data and cause a denial of service.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63540
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27456
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the VDec::VDec() function at /sql/sql_type.cc. A remote user can pass specially crafted data and cause a denial of service.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63543
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27457
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the my_mb_wc_latin1 component in the /strings/ctype-latin1.c. A remote user can pass specially crafted data and cause a denial of service.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63545
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-27458
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the Binary_string::free_buffer() function at /sql/sql_string.h. A remote user can pass specially crafted data and cause a denial of service.
Update the affected package mariadb to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.3
SUSE Manager Server: 4.2
SUSE Manager Proxy: 4.2
SUSE Linux Enterprise Server for SAP Applications: 15-SP3
SUSE Linux Enterprise Server: 15-SP3
SUSE Linux Enterprise High Performance Computing: 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP3
SUSE Linux Enterprise Module for Server Applications: 15-SP3
mariadb-galera: before 10.5.16-150300.3.18.1
mariadb-errormessages: before 10.5.16-150300.3.18.1
mariadb-tools-debuginfo: before 10.5.16-150300.3.18.1
mariadb-tools: before 10.5.16-150300.3.18.1
mariadb-test-debuginfo: before 10.5.16-150300.3.18.1
mariadb-test: before 10.5.16-150300.3.18.1
mariadb-rpm-macros: before 10.5.16-150300.3.18.1
mariadb-debugsource: before 10.5.16-150300.3.18.1
mariadb-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client-debuginfo: before 10.5.16-150300.3.18.1
mariadb-client: before 10.5.16-150300.3.18.1
mariadb-bench-debuginfo: before 10.5.16-150300.3.18.1
mariadb-bench: before 10.5.16-150300.3.18.1
mariadb: before 10.5.16-150300.3.18.1
libmariadbd19-debuginfo: before 10.5.16-150300.3.18.1
libmariadbd19: before 10.5.16-150300.3.18.1
libmariadbd-devel: before 10.5.16-150300.3.18.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222003-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.