<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libmariadbd-devel-10.6.5-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11648-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libmariadbd-devel-10.6.5-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libmariadbd-devel-10.6.5-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11648</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2154/</URL>
      <Description>SUSE CVE CVE-2021-2154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2166/</URL>
      <Description>SUSE CVE CVE-2021-2166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-27928/</URL>
      <Description>SUSE CVE CVE-2021-27928 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmariadbd-devel-10.6.5-3.1">
      <FullProductName ProductID="libmariadbd-devel-10.6.5-3.1">libmariadbd-devel-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmariadbd19-10.6.5-3.1">
      <FullProductName ProductID="libmariadbd19-10.6.5-3.1">libmariadbd19-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.6.5-3.1">
      <FullProductName ProductID="mariadb-10.6.5-3.1">mariadb-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-10.6.5-3.1">
      <FullProductName ProductID="mariadb-bench-10.6.5-3.1">mariadb-bench-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.6.5-3.1">
      <FullProductName ProductID="mariadb-client-10.6.5-3.1">mariadb-client-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.6.5-3.1">
      <FullProductName ProductID="mariadb-errormessages-10.6.5-3.1">mariadb-errormessages-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-galera-10.6.5-3.1">
      <FullProductName ProductID="mariadb-galera-10.6.5-3.1">mariadb-galera-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-rpm-macros-10.6.5-3.1">
      <FullProductName ProductID="mariadb-rpm-macros-10.6.5-3.1">mariadb-rpm-macros-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-10.6.5-3.1">
      <FullProductName ProductID="mariadb-test-10.6.5-3.1">mariadb-test-10.6.5-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.6.5-3.1">
      <FullProductName ProductID="mariadb-tools-10.6.5-3.1">mariadb-tools-10.6.5-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmariadbd-devel-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmariadbd-devel-10.6.5-3.1">libmariadbd-devel-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmariadbd19-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmariadbd19-10.6.5-3.1">libmariadbd19-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-10.6.5-3.1">mariadb-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-bench-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-bench-10.6.5-3.1">mariadb-bench-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-client-10.6.5-3.1">mariadb-client-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-errormessages-10.6.5-3.1">mariadb-errormessages-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-galera-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-galera-10.6.5-3.1">mariadb-galera-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-rpm-macros-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-rpm-macros-10.6.5-3.1">mariadb-rpm-macros-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-test-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-test-10.6.5-3.1">mariadb-test-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.6.5-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-tools-10.6.5-3.1">mariadb-tools-10.6.5-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2154.html</URL>
        <Description>CVE-2021-2154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185872</URL>
        <Description>SUSE Bug 1185872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199955</URL>
        <Description>SUSE Bug 1199955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2166.html</URL>
        <Description>CVE-2021-2166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185870</URL>
        <Description>SUSE Bug 1185870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199955</URL>
        <Description>SUSE Bug 1199955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.</Note>
    </Notes>
    <CVE>CVE-2021-27928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.5-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.5-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-27928.html</URL>
        <Description>CVE-2021-27928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183770</URL>
        <Description>SUSE Bug 1183770</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
