Fedora 28: MariaDB 10.2.15 Security Update with CVE Fixes
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Tenable Nessus | Fedora 27 : 3:mariadb (2018-86026275ea) | 25 Jun 201800:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : mariadb (openSUSE-2018-572) | 8 Jun 201800:00 | – | nessus |
Tenable Nessus | SUSE SLES12 Security Update : mariadb (SUSE-SU-2018:1382-1) | 24 May 201800:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : mariadb (openSUSE-2018-668) | 25 Jun 201800:00 | – | nessus |
Tenable Nessus | SUSE SLED12 / SLES12 Security Update : mariadb (SUSE-SU-2018:1781-1) | 25 Jun 201800:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : mariadb (openSUSE-2019-427) | 27 Mar 201900:00 | – | nessus |
Tenable Nessus | Slackware 14.1 / 14.2 : mariadb (SSA:2018-130-01) | 11 May 201800:00 | – | nessus |
Tenable Nessus | Fedora 26 : 3:mariadb (2018-d955395c08) | 23 May 201800:00 | – | nessus |
Tenable Nessus | SUSE SLES12 Security Update : mariadb (SUSE-SU-2018:1781-2) | 22 Oct 201800:00 | – | nessus |
Tenable Nessus | MariaDB 10.2.0 < 10.2.15 Multiple Vulnerabilities | 18 Nov 202200:00 | – | nessus |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2018-2513b888a4.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(120297);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/07/08");
script_cve_id(
"CVE-2018-2755",
"CVE-2018-2759",
"CVE-2018-2761",
"CVE-2018-2766",
"CVE-2018-2771",
"CVE-2018-2777",
"CVE-2018-2781",
"CVE-2018-2782",
"CVE-2018-2784",
"CVE-2018-2786",
"CVE-2018-2787",
"CVE-2018-2810",
"CVE-2018-2813",
"CVE-2018-2817",
"CVE-2018-2819"
);
script_xref(name:"FEDORA", value:"2018-2513b888a4");
script_name(english:"Fedora 28 : 3:mariadb (2018-2513b888a4)");
script_set_attribute(attribute:"synopsis", value:
"The remote Fedora host is missing a security update.");
script_set_attribute(attribute:"description", value:
"**MariaDB 10.2.15**
Release notes :
https://mariadb.com/kb/en/library/mariadb-10215-release-notes/
CVEs fixed :
CVE-2018-2755 CVE-2018-2761 CVE-2018-2766 CVE-2018-2771 CVE-2018-2781
CVE-2018-2782 CVE-2018-2784 CVE-2018-2787 CVE-2018-2813 CVE-2018-2817
CVE-2018-2819 CVE-2018-2786 CVE-2018-2759 CVE-2018-2777 CVE-2018-2810
New features :
- Now builds with lz4 support
Enhacements :
- mysqladmin is now used to check the socket when the
daemon is starting
issues :
- Please note, that TokuDB storage engine is being build
in a unsupported way - without jemalloc. it will remain
this way, until TokuDB is fixed to be able to build and
run with jemalloc 5 or witout jemalloc at all.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2018-2513b888a4");
script_set_attribute(attribute:"solution", value:
"Update the affected 3:mariadb package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-2787");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2018-2755");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/04/19");
script_set_attribute(attribute:"patch_publication_date", value:"2018/06/20");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/03");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:3:mariadb");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:28");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Fedora Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^28([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 28", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC28", reference:"mariadb-10.2.15-2.fc28", epoch:"3")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "3:mariadb");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo