Bugzilla – Bug 1185872
VUL-0: CVE-2021-2154: mysql,mariadb,mariadb-100: mysql: Server: DML unspecified vulnerability can lead to complete DOS (CPU Apr 2021)
Last modified: 2022-06-10 12:42:44 UTC
CVE-2021-2154 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. External References: https://www.oracle.com/security-alerts/cpuapr2021.html#AppendixMSQL References: https://bugzilla.redhat.com/show_bug.cgi?id=1951752 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-2154 https://www.oracle.com/security-alerts/cpuapr2021.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154
Affected packages: - SUSE:SLE-11:Update/mysql 5.0.96 - SUSE:SLE-12-SP2:Update:Products:Cloud7:Update/mariadb 10.2.36 - SUSE:SLE-12-SP4:Update/mariadb 10.2.36 - SUSE:SLE-15:Update/mariadb 10.2.37 - SUSE:SLE-15-SP2:Update/mariadb 10.4.17 - SUSE:SLE-15-SP3:Update/mariadb 10.5.8 - openSUSE:Factory/mariadb 10.5.9 not sure about the following packages, maintainer point-of-view is required: - SUSE:SLE-12-SP4:Update/mariadb-100 10.0.40.4 - SUSE:SLE-12-SP1:Update/mariadb 10.0.40.4 Upstream patches are within these changes [0][1][2][3]. [0] https://github.com/MariaDB/server/compare/mariadb-10.2.37...mariadb-10.2.38 [1] https://github.com/MariaDB/server/compare/mariadb-10.3.28...mariadb-10.3.29 [2] https://github.com/MariaDB/server/compare/mariadb-10.4.18...mariadb-10.4.19 [3] https://github.com/MariaDB/server/compare/mariadb-10.5.9...mariadb-10.5.10
SUSE-RU-2021:2185-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1179921,1183878,1185868,1185870,1185872,1187459 CVE References: JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): mariadb-connector-c-3.1.13-2.27.1 SUSE OpenStack Cloud 9 (src): mariadb-connector-c-3.1.13-2.27.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): mariadb-connector-c-3.1.13-2.27.1 SUSE Linux Enterprise Server 12-SP5 (src): mariadb-connector-c-3.1.13-2.27.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): mariadb-connector-c-3.1.13-2.27.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2021:2265-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1179921,1183878,1185868,1185870,1185872,1187459 CVE References: JIRA References: Sources used: SUSE Manager Server 4.0 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Manager Retail Branch Server 4.0 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Manager Proxy 4.0 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Server for SAP 15 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Server 15-LTSS (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): mariadb-connector-c-3.1.13-3.30.1 SUSE Enterprise Storage 6 (src): mariadb-connector-c-3.1.13-3.30.1 SUSE CaaS Platform 4.0 (src): mariadb-connector-c-3.1.13-3.30.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2021:1018-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1179921,1183878,1185868,1185870,1185872,1187459 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): mariadb-connector-c-3.1.13-lp152.10.1
openSUSE-RU-2021:2265-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1179921,1183878,1185868,1185870,1185872,1187459 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): mariadb-connector-c-3.1.13-3.30.1
openSUSE-SU-2021:2605-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1182739,1183770,1185870,1185872 CVE References: CVE-2021-2154,CVE-2021-2166,CVE-2021-27928 JIRA References: Sources used: openSUSE Leap 15.3 (src): mariadb-10.5.11-3.3.1
SUSE-SU-2021:2605-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1182739,1183770,1185870,1185872 CVE References: CVE-2021-2154,CVE-2021-2166,CVE-2021-27928 JIRA References: Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): mariadb-10.5.11-3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:2616-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1182739,1183770,1185870,1185872 CVE References: CVE-2021-2154,CVE-2021-2166,CVE-2021-27928 JIRA References: Sources used: openSUSE Leap 15.3 (src): mariadb-10.4.20-3.9.1
SUSE-SU-2021:2617-1: An update that solves four vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 1182739,1183770,1185868,1185870,1185872,1188300 CVE References: CVE-2021-2154,CVE-2021-2166,CVE-2021-2180,CVE-2021-27928 JIRA References: Sources used: SUSE Manager Server 4.0 (src): mariadb-10.2.39-3.40.1 SUSE Manager Retail Branch Server 4.0 (src): mariadb-10.2.39-3.40.1 SUSE Manager Proxy 4.0 (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise Server for SAP 15 (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise Server 15-LTSS (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): mariadb-10.2.39-3.40.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): mariadb-10.2.39-3.40.1 SUSE Enterprise Storage 6 (src): mariadb-10.2.39-3.40.1 SUSE CaaS Platform 4.0 (src): mariadb-10.2.39-3.40.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:2617-1: An update that solves four vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 1182739,1183770,1185868,1185870,1185872,1188300 CVE References: CVE-2021-2154,CVE-2021-2166,CVE-2021-2180,CVE-2021-27928 JIRA References: Sources used: openSUSE Leap 15.3 (src): mariadb-10.2.39-3.40.1
SUSE-SU-2021:2616-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1182739,1183770,1185870,1185872 CVE References: CVE-2021-2154,CVE-2021-2166,CVE-2021-27928 JIRA References: Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): mariadb-10.4.20-3.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:2634-1: An update that solves four vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 1182739,1183770,1185868,1185870,1185872,1188300 CVE References: CVE-2021-2154,CVE-2021-2166,CVE-2021-2180,CVE-2021-27928 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): mariadb-10.2.39-3.36.1 SUSE OpenStack Cloud 9 (src): mariadb-10.2.39-3.36.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): mariadb-10.2.39-3.36.1 SUSE Linux Enterprise Server 12-SP5 (src): mariadb-10.2.39-3.36.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): mariadb-10.2.39-3.36.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
released
Hi cloud team, please submit for SUSE:SLE-12-SP3:Update:Products:Cloud8:Update.
Fixes for SOC 8 only if the base score is higher than 7, which is not the case for this CVE. Back to Security team.
Ciao Danilo, we realized you mistyped the CVE ID in (CVE-2021-2145 instead of CVE-2021-2154): - SUSE:SLE-15-SP3:Update/mariadb/mariadb.changes - SUSE:SLE-15-SP4:Update/mariadb/mariadb.changes Please submit a fix. @Marcus: I'm pretty sure we have scripts in place that may have misused this typo. What/how should we manually fix? PS: we might want to think to a dedicated check for python-checkers for that kind of mistakes.
Ciao Gianluca, I am sorry for the typo, I have just submitted the fix in all the affected codestreams and in Factory as well.
Done, closing.