Lucene search

K
debianDebianDEBIAN:DLA-3722-1:EC6C5
HistoryJan 27, 2024 - 7:46 a.m.

[SECURITY] [DLA 3722-1] mariadb-10.3 security update

2024-01-2707:46:34
lists.debian.org
8
dos
network access
mariadb suite
unauthorized ability
debian 10 buster

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.3%


Debian LTS Advisory DLA-3722-1 [email protected]
https://www.debian.org/lts/security/ Bastien ROUCARIÃ?S
January 27, 2024 https://wiki.debian.org/LTS


Package : mariadb-10.3
Version : 1:10.3.39-0+deb10u2
CVE ID : CVE-2023-22084
Debian Bug : 1055034

A vulnerability was fixed in MariaDB, a database suite.
This vulnerability allowed a high privileged attacker
with network access to compromise a MariaDB Server.
Successful attacks of this vulnerability can
result in unauthorized ability to cause a hang
or frequently repeatable crash.

The main risk was a complete DOS of the sever.

For Debian 10 buster, this problem has been fixed in version
1:10.3.39-0+deb10u2.

We recommend that you upgrade your mariadb-10.3 packages.

For the detailed security status of mariadb-10.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mariadb-10.3

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.3%