PatchSiren cyber security CVE debrief
CVE-2017-3302 Redhat CVE debrief
CVE-2017-3302 is a high-severity availability issue in libmysqlclient.so. NVD rates it 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and classifies the weakness as CWE-416. The vulnerable scope includes Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5, plus MariaDB through 5.5.54, 10.0.29, 10.1.21, and 10.2.3. NVD also links downstream Debian and Red Hat advisories, indicating packaged consumers may need distro-specific remediation as well.
- Vendor
- Redhat
- Product
- CVE-2017-3302
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-12
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-12
- Advisory updated
- 2026-05-13
Who should care
Administrators and developers running Oracle MySQL or MariaDB client libraries, plus operators of applications that link against libmysqlclient.so. Debian and Red Hat system owners should also check the linked vendor advisories for packaged downstream fixes.
Technical summary
The NVD record describes a crash in libmysqlclient.so. The published CVSS vector shows a network-reachable, low-complexity issue with no privileges or user interaction required, and the impact is limited to availability. NVD maps the weakness to CWE-416 and lists affected upstream versions for Oracle MySQL and MariaDB, along with several downstream Debian 8.0 and Red Hat Enterprise Linux 7 product CPEs.
Defensive priority
High
Recommended defensive actions
- Inventory hosts and applications that use Oracle MySQL or MariaDB client libraries, including packaged libmysqlclient.so deployments.
- Upgrade beyond the vulnerable version ranges listed by NVD for Oracle MySQL and MariaDB.
- For Debian and Red Hat systems, apply the vendor advisories referenced by NVD and verify the patched packages are installed.
- Restart affected services after patching so they load the updated client library.
- Monitor for unexpected crashes in applications that depend on libmysqlclient.so, especially in production services.
Evidence notes
All substantive details come from the supplied NVD CVE record and its referenced advisories. The affected version ranges, CVSS vector, and CWE-416 classification are taken from NVD. Timing context uses the CVE published date of 2017-02-12 and the referenced Oracle, Debian, and Red Hat advisories cited in the record. No exploit code or unsupported exploitation claims are included.
Official resources
-
CVE-2017-3302 CVE record
CVE.org
-
CVE-2017-3302 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed in the CVE record on 2017-02-12. The NVD entry also references Oracle, Debian, and Red Hat advisories for remediation context.