MySQL 5.7.22
Changelog
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-22.html
CVEs fixed
CVE-2018-2755 CVE-2018-2758 CVE-2018-2759 CVE-2018-2761 CVE-2018-2762 CVE-2018-2766 CVE-2018-2769 CVE-2018-2771 CVE-2018-2773 CVE-2018-2775 CVE-2018-2776 CVE-2018-2777 CVE-2018-2778 CVE-2018-2779 CVE-2018-2780 CVE-2018-2781 CVE-2018-2782 CVE-2018-2784 CVE-2018-2786 CVE-2018-2787 CVE-2018-2810 CVE-2018-2812 CVE-2018-2813 CVE-2018-2816 CVE-2018-2817 CVE-2018-2818 CVE-2018-2819 CVE-2018-2839 CVE-2018-2846
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2018-00e90783d2.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(120201);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2018-2755", "CVE-2018-2758", "CVE-2018-2759", "CVE-2018-2761", "CVE-2018-2762", "CVE-2018-2766", "CVE-2018-2769", "CVE-2018-2771", "CVE-2018-2773", "CVE-2018-2775", "CVE-2018-2776", "CVE-2018-2777", "CVE-2018-2778", "CVE-2018-2779", "CVE-2018-2780", "CVE-2018-2781", "CVE-2018-2782", "CVE-2018-2784", "CVE-2018-2786", "CVE-2018-2787", "CVE-2018-2810", "CVE-2018-2812", "CVE-2018-2813", "CVE-2018-2816", "CVE-2018-2817", "CVE-2018-2818", "CVE-2018-2819", "CVE-2018-2839", "CVE-2018-2846");
script_xref(name:"FEDORA", value:"2018-00e90783d2");
script_name(english:"Fedora 28 : community-mysql (2018-00e90783d2)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"**MySQL 5.7.22**
**Changelog**
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-22.html
**CVEs fixed**
CVE-2018-2755 CVE-2018-2758 CVE-2018-2759 CVE-2018-2761 CVE-2018-2762
CVE-2018-2766 CVE-2018-2769 CVE-2018-2771 CVE-2018-2773 CVE-2018-2775
CVE-2018-2776 CVE-2018-2777 CVE-2018-2778 CVE-2018-2779 CVE-2018-2780
CVE-2018-2781 CVE-2018-2782 CVE-2018-2784 CVE-2018-2786 CVE-2018-2787
CVE-2018-2810 CVE-2018-2812 CVE-2018-2813 CVE-2018-2816 CVE-2018-2817
CVE-2018-2818 CVE-2018-2819 CVE-2018-2839 CVE-2018-2846
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bodhi.fedoraproject.org/updates/FEDORA-2018-00e90783d2"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected community-mysql package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-2812");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:community-mysql");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:28");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/04/19");
script_set_attribute(attribute:"patch_publication_date", value:"2018/05/03");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/03");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^28([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 28", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC28", reference:"community-mysql-5.7.22-1.fc28")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "community-mysql");
}
Vendor | Product | Version |
---|---|---|
fedoraproject | fedora | community-mysql |
fedoraproject | fedora | 28 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2762
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2776
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2778
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2786
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2846
bodhi.fedoraproject.org/updates/FEDORA-2018-00e90783d2