This update for mariadb to version 10.0.33 fixes several issues.
These security issues were fixed :
CVE-2017-10378: Vulnerability in subcomponent: Server:
Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1064115).
CVE-2017-10268: Vulnerability in subcomponent: Server:
Replication. Difficult to exploit vulnerability allowed high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data (bsc#1064101).
These non-security issues were fixed :
CHECK TABLE no longer returns an error when run on a CONNECT table
‘Undo log record is too big.’ error occurring in very narrow range of string lengths
Race condition between INFORMATION_SCHEMA.INNODB_SYS_TABLESTATS and ALTER/DROP/TRUNCATE TABLE
Wrong result after altering a partitioned table fixed bugs in InnoDB FULLTEXT INDEX
InnoDB FTS duplicate key error
InnoDB crash after failed ADD INDEX and table_definition_cache eviction
fts_create_doc_id() unnecessarily allocates 8 bytes for every inserted row
IMPORT TABLESPACE may corrupt ROW_FORMAT=REDUNDANT tables
For additional details please see https://kb.askmonty.org/en/mariadb-10033-changelog
This update was imported from the SUSE:SLE-12-SP1:Update update project.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2018-146.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(106669);
script_version("3.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2017-10268", "CVE-2017-10378");
script_name(english:"openSUSE Security Update : mariadb (openSUSE-2018-146)");
script_summary(english:"Check for the openSUSE-2018-146 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"This update for mariadb to version 10.0.33 fixes several issues.
These security issues were fixed :
- CVE-2017-10378: Vulnerability in subcomponent: Server:
Optimizer. Easily exploitable vulnerability allowed low
privileged attacker with network access via multiple
protocols to compromise MySQL Server. Successful attacks
of this vulnerability can result in unauthorized ability
to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1064115).
- CVE-2017-10268: Vulnerability in subcomponent: Server:
Replication. Difficult to exploit vulnerability allowed
high privileged attacker with logon to the
infrastructure where MySQL Server executes to compromise
MySQL Server. Successful attacks of this vulnerability
can result in unauthorized access to critical data or
complete access to all MySQL Server accessible data
(bsc#1064101).
These non-security issues were fixed :
- CHECK TABLE no longer returns an error when run on a
CONNECT table
- 'Undo log record is too big.' error occurring in very
narrow range of string lengths
- Race condition between
INFORMATION_SCHEMA.INNODB_SYS_TABLESTATS and
ALTER/DROP/TRUNCATE TABLE
- Wrong result after altering a partitioned table fixed
bugs in InnoDB FULLTEXT INDEX
- InnoDB FTS duplicate key error
- InnoDB crash after failed ADD INDEX and
table_definition_cache eviction
- fts_create_doc_id() unnecessarily allocates 8 bytes for
every inserted row
- IMPORT TABLESPACE may corrupt ROW_FORMAT=REDUNDANT
tables
For additional details please see
https://kb.askmonty.org/en/mariadb-10033-changelog
This update was imported from the SUSE:SLE-12-SP1:Update update
project."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058722"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1064101"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1064115"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1076505"
);
# https://kb.askmonty.org/en/mariadb-10033-changelog
script_set_attribute(
attribute:"see_also",
value:"https://mariadb.com/kb/en/library/mariadb-10033-changelog/"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected mariadb packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqlclient-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqlclient18");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqlclient18-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqlclient18-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqlclient18-debuginfo-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqlclient_r18");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqlclient_r18-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqld-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqld18");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysqld18-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-bench");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-bench-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-client");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-client-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-errormessages");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-test");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-test-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mariadb-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.3");
script_set_attribute(attribute:"patch_publication_date", value:"2018/02/08");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/02/08");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE42\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.3", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE42.3", reference:"libmysqlclient-devel-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"libmysqlclient18-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"libmysqlclient18-debuginfo-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"libmysqlclient_r18-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"libmysqld-devel-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"libmysqld18-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"libmysqld18-debuginfo-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-bench-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-bench-debuginfo-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-client-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-client-debuginfo-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-debuginfo-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-debugsource-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-errormessages-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-test-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-test-debuginfo-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-tools-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"mariadb-tools-debuginfo-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libmysqlclient18-32bit-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libmysqlclient18-debuginfo-32bit-10.0.33-29.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libmysqlclient_r18-32bit-10.0.33-29.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libmysqlclient-devel / libmysqlclient18 / libmysqlclient18-32bit / etc");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | opensuse | libmysqlclient-devel | p-cpe:/a:novell:opensuse:libmysqlclient-devel |
novell | opensuse | libmysqlclient18 | p-cpe:/a:novell:opensuse:libmysqlclient18 |
novell | opensuse | libmysqlclient18-32bit | p-cpe:/a:novell:opensuse:libmysqlclient18-32bit |
novell | opensuse | libmysqlclient18-debuginfo | p-cpe:/a:novell:opensuse:libmysqlclient18-debuginfo |
novell | opensuse | libmysqlclient18-debuginfo-32bit | p-cpe:/a:novell:opensuse:libmysqlclient18-debuginfo-32bit |
novell | opensuse | libmysqlclient_r18 | p-cpe:/a:novell:opensuse:libmysqlclient_r18 |
novell | opensuse | libmysqlclient_r18-32bit | p-cpe:/a:novell:opensuse:libmysqlclient_r18-32bit |
novell | opensuse | libmysqld-devel | p-cpe:/a:novell:opensuse:libmysqld-devel |
novell | opensuse | libmysqld18 | p-cpe:/a:novell:opensuse:libmysqld18 |
novell | opensuse | libmysqld18-debuginfo | p-cpe:/a:novell:opensuse:libmysqld18-debuginfo |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
bugzilla.opensuse.org/show_bug.cgi?id=1058722
bugzilla.opensuse.org/show_bug.cgi?id=1064101
bugzilla.opensuse.org/show_bug.cgi?id=1064115
bugzilla.opensuse.org/show_bug.cgi?id=1076505
mariadb.com/kb/en/library/mariadb-10033-changelog/