RHEL 9 : mariadb:10.11 (RHSA-2026:0247)

medium Nessus Plugin ID 282415

Synopsis

The remote Red Hat host is missing one or more security updates for mariadb:10.11.

Description

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:0247 advisory.

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

Security Fix(es):

* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)

* mariadb: MariaDB Server Crash Due to Empty Backtrace Log (CVE-2023-52969)

* mariadb: MariaDB Server Crash (CVE-2023-52971)

* mariadb: MariaDB Server Crash via Item_direct_view_ref (CVE-2023-52970)

* mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)

* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)

* mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation (CVE-2025-13699)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL mariadb:10.11 package based on the guidance in RHSA-2026:0247.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=2339221

https://bugzilla.redhat.com/show_bug.cgi?id=2350916

https://bugzilla.redhat.com/show_bug.cgi?id=2350917

https://bugzilla.redhat.com/show_bug.cgi?id=2350918

https://bugzilla.redhat.com/show_bug.cgi?id=2359885

https://bugzilla.redhat.com/show_bug.cgi?id=2359963

https://bugzilla.redhat.com/show_bug.cgi?id=2417693

https://issues.redhat.com/browse/RHEL-125855

https://issues.redhat.com/browse/RHEL-130867

https://issues.redhat.com/browse/RHEL-130870

https://issues.redhat.com/browse/RHEL-132454

http://www.nessus.org/u?0aa8d71a

https://access.redhat.com/errata/RHSA-2026:0247

Plugin Details

Severity: Medium

ID: 282415

File Name: redhat-RHSA-2026-0247.nasl

Version: 1.2

Type: local

Agent: unix

Published: 1/8/2026

Updated: 1/9/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 6.6

Temporal Score: 4.9

Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:N

CVSS Score Source: CVE-2025-30722

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:mariadb-backup, p-cpe:/a:redhat:enterprise_linux:mariadb-embedded, p-cpe:/a:redhat:enterprise_linux:mariadb-gssapi-server, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:mariadb-errmsg, p-cpe:/a:redhat:enterprise_linux:mariadb-devel, p-cpe:/a:redhat:enterprise_linux:mariadb, p-cpe:/a:redhat:enterprise_linux:mariadb-server-galera, p-cpe:/a:redhat:enterprise_linux:mariadb-common, p-cpe:/a:redhat:enterprise_linux:mariadb-oqgraph-engine, p-cpe:/a:redhat:enterprise_linux:mariadb-server-utils, p-cpe:/a:redhat:enterprise_linux:mariadb-test, p-cpe:/a:redhat:enterprise_linux:galera, p-cpe:/a:redhat:enterprise_linux:mariadb-embedded-devel, p-cpe:/a:redhat:enterprise_linux:mariadb-server, p-cpe:/a:redhat:enterprise_linux:mariadb-pam

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/7/2026

Vulnerability Publication Date: 1/21/2025

Reference Information

CVE: CVE-2023-52969, CVE-2023-52970, CVE-2023-52971, CVE-2025-13699, CVE-2025-21490, CVE-2025-30693, CVE-2025-30722

CWE: 1038, 22, 404

IAVA: 2026-A-0015

RHSA: 2026:0247