Bug 1225983 (CVE-2024-21096)

Summary: VUL-0: CVE-2024-21096: mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024)
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Antonio Teixeira <antonio.teixeira>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: gianluca.gabrielli, stoyan.manolov
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/402172/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-21096:5.9:(AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-06-05 08:24:02 UTC
Vulnerability in the MySQL Server product of Oracle MySQL (component: Client: mysqldump).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data as well as  unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).

References:
https://www.oracle.com/security-alerts/cpuapr2024.html
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21096
https://www.cve.org/CVERecord?id=CVE-2024-21096
https://security.netapp.com/advisory/ntap-20240426-0013/
https://bugzilla.redhat.com/show_bug.cgi?id=2275452
Comment 5 Maintenance Automation 2024-06-11 12:30:17 UTC
SUSE-SU-2024:1985-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1217405, 1225983
CVE References: CVE-2023-22084, CVE-2024-21096
Maintenance Incident: [SUSE:Maintenance:34175](https://smelt.suse.de/incident/34175/)
Sources used:
openSUSE Leap 15.4 (src):
 mariadb-10.6.18-150400.3.33.1
openSUSE Leap 15.5 (src):
 mariadb-10.6.18-150400.3.33.1
SUSE Package Hub 15 15-SP5 (src):
 mariadb-10.6.18-150400.3.33.1
Server Applications Module 15-SP5 (src):
 mariadb-10.6.18-150400.3.33.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 mariadb-10.6.18-150400.3.33.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 mariadb-10.6.18-150400.3.33.1
Galera for Ericsson 15 SP4 (src):
 mariadb-10.6.18-150400.3.33.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 mariadb-10.6.18-150400.3.33.1
Galera for Ericsson 15 SP5 (src):
 mariadb-10.6.18-150400.3.33.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 mariadb-10.6.18-150400.3.33.1
SUSE Manager Proxy 4.3 (src):
 mariadb-10.6.18-150400.3.33.1
SUSE Manager Retail Branch Server 4.3 (src):
 mariadb-10.6.18-150400.3.33.1
SUSE Manager Server 4.3 (src):
 mariadb-10.6.18-150400.3.33.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2024-06-14 16:30:01 UTC
SUSE-SU-2024:2032-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1225983
CVE References: CVE-2024-21096
Maintenance Incident: [SUSE:Maintenance:34173](https://smelt.suse.de/incident/34173/)
Sources used:
openSUSE Leap 15.6 (src):
 mariadb-10.11.8-150600.4.3.1
SUSE Package Hub 15 15-SP6 (src):
 mariadb-10.11.8-150600.4.3.1
Server Applications Module 15-SP6 (src):
 mariadb-10.11.8-150600.4.3.1
Galera for Ericsson 15 SP6 (src):
 mariadb-10.11.8-150600.4.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.