RHEL 6 / 7 : rh-mariadb102-mariadb and rh-mariadb102-galera (RHSA-2019:1258)

high Nessus Plugin ID 194143

Synopsis

The remote Red Hat host is missing one or more security updates for rh-mariadb102-mariadb / rh-mariadb102-galera.

Description

The remote Redhat Enterprise Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2019:1258 advisory.

MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL.

The following packages have been upgraded to a later upstream version: rh-mariadb102-mariadb (10.2.22), rh-mariadb102-galera (25.3.25).

Security Fix(es):

* mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) (CVE-2017-10268)

* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) (CVE-2017-10378)

* mariadb: Replication in sql/event_data_objects.cc occurs before ACL checks (CVE-2017-15365)

* mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) (CVE-2018-2562)

* mysql: InnoDB unspecified vulnerability (CPU Jan 2018) (CVE-2018-2612)

* mysql: Server: DDL unspecified vulnerability (CPU Jan 2018) (CVE-2018-2622)

* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jan 2018) (CVE-2018-2640, CVE-2018-2665, CVE-2018-2668)

* mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) (CVE-2018-2755)

* mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2018) (CVE-2018-2759, CVE-2018-2766, CVE-2018-2777, CVE-2018-2782, CVE-2018-2784, CVE-2018-2786, CVE-2018-2787, CVE-2018-2810, CVE-2018-2819)

* mysql: Client programs unspecified vulnerability (CPU Apr 2018) (CVE-2018-2761)

* mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) (CVE-2018-2771)

* mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) (CVE-2018-2781)

* mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2018) (CVE-2018-2813, CVE-2018-2817)

* mysql: MyISAM unspecified vulnerability (CPU Jul 2018) (CVE-2018-3058)

* mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2018) (CVE-2018-3060, CVE-2018-3064)

* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) (CVE-2018-3063)

* mysql: Client programs unspecified vulnerability (CPU Jul 2018) (CVE-2018-3081)

* mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) (CVE-2018-3133)

* mysql: InnoDB multiple unspecified vulnerabilities (CPU Oct 2018) (CVE-2018-3143, CVE-2018-3156, CVE-2018-3162, CVE-2018-3173, CVE-2018-3185, CVE-2018-3200, CVE-2018-3251, CVE-2018-3277, CVE-2018-3284)

* mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) (CVE-2018-3282)

* mysql: Server: Parser unspecified vulnerability (CPU Jan 2019) (CVE-2019-2455)

* mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) (CVE-2019-2503)

* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)

* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)

* mysql: Server: Options unspecified vulnerability (CPU Jul 2018) (CVE-2018-3066)

* mysql: Init script calling kill with root privileges using pid from pidfile owned by mysql user (CPU Oct 2018) (CVE-2018-3174)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* SELinux blocks working in /tmp directory for wsrep_recover_position function (BZ#1701252)

* mysql faces a bug which prevents bacula from functioning (BZ#1701254)

* GSSAPI module build fix - backport request (BZ#1701257)

* Deadlock in RNG initialization in the FIPS mode on some circumstances (BZ#1701258)

* Use appropriate version of Galera (BZ#1704162)

* Encountered WSREP: BF lock wait long for trx MariaDB 10.2.8 (BZ#1709233)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL rh-mariadb102-mariadb / rh-mariadb102-galera packages based on the guidance in RHSA-2019:1258.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1503656

https://bugzilla.redhat.com/show_bug.cgi?id=1503684

https://bugzilla.redhat.com/show_bug.cgi?id=1524234

https://bugzilla.redhat.com/show_bug.cgi?id=1535484

https://bugzilla.redhat.com/show_bug.cgi?id=1535497

https://bugzilla.redhat.com/show_bug.cgi?id=1535499

https://bugzilla.redhat.com/show_bug.cgi?id=1535500

https://bugzilla.redhat.com/show_bug.cgi?id=1535504

https://bugzilla.redhat.com/show_bug.cgi?id=1535506

https://bugzilla.redhat.com/show_bug.cgi?id=1568921

https://bugzilla.redhat.com/show_bug.cgi?id=1568923

https://bugzilla.redhat.com/show_bug.cgi?id=1568924

https://bugzilla.redhat.com/show_bug.cgi?id=1568926

https://bugzilla.redhat.com/show_bug.cgi?id=1568931

https://bugzilla.redhat.com/show_bug.cgi?id=1568937

https://bugzilla.redhat.com/show_bug.cgi?id=1568942

https://bugzilla.redhat.com/show_bug.cgi?id=1568943

https://bugzilla.redhat.com/show_bug.cgi?id=1568944

https://bugzilla.redhat.com/show_bug.cgi?id=1568945

https://bugzilla.redhat.com/show_bug.cgi?id=1568946

https://bugzilla.redhat.com/show_bug.cgi?id=1568949

https://bugzilla.redhat.com/show_bug.cgi?id=1568951

https://bugzilla.redhat.com/show_bug.cgi?id=1568954

https://bugzilla.redhat.com/show_bug.cgi?id=1568956

https://bugzilla.redhat.com/show_bug.cgi?id=1602356

https://bugzilla.redhat.com/show_bug.cgi?id=1602357

https://bugzilla.redhat.com/show_bug.cgi?id=1602363

https://bugzilla.redhat.com/show_bug.cgi?id=1602364

https://bugzilla.redhat.com/show_bug.cgi?id=1602366

https://bugzilla.redhat.com/show_bug.cgi?id=1602424

https://bugzilla.redhat.com/show_bug.cgi?id=1640308

https://bugzilla.redhat.com/show_bug.cgi?id=1640310

https://bugzilla.redhat.com/show_bug.cgi?id=1640312

https://bugzilla.redhat.com/show_bug.cgi?id=1640316

https://bugzilla.redhat.com/show_bug.cgi?id=1640318

https://bugzilla.redhat.com/show_bug.cgi?id=1640321

https://bugzilla.redhat.com/show_bug.cgi?id=1640322

https://bugzilla.redhat.com/show_bug.cgi?id=1640325

https://bugzilla.redhat.com/show_bug.cgi?id=1640331

https://bugzilla.redhat.com/show_bug.cgi?id=1640332

https://bugzilla.redhat.com/show_bug.cgi?id=1640335

https://bugzilla.redhat.com/show_bug.cgi?id=1640337

https://bugzilla.redhat.com/show_bug.cgi?id=1666742

https://bugzilla.redhat.com/show_bug.cgi?id=1666749

https://bugzilla.redhat.com/show_bug.cgi?id=1666751

https://bugzilla.redhat.com/show_bug.cgi?id=1666763

https://bugzilla.redhat.com/show_bug.cgi?id=1701252

https://bugzilla.redhat.com/show_bug.cgi?id=1701257

https://bugzilla.redhat.com/show_bug.cgi?id=1704162

https://bugzilla.redhat.com/show_bug.cgi?id=1709233

http://www.nessus.org/u?6baf5b05

https://access.redhat.com/errata/RHSA-2019:1258

Plugin Details

Severity: High

ID: 194143

File Name: redhat-RHSA-2019-1258.nasl

Version: 1.2

Type: local

Agent: unix

Published: 4/28/2024

Updated: 11/6/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:C

CVSS Score Source: CVE-2018-2612

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2017-15365

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-server-utils-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-config-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-devel, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-server, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-test, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-config, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-server-galera-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-gssapi-server, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-server-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-common, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-gssapi-client, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-galera, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-server-galera, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-errmsg, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-oqgraph-engine, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-bench, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-backup, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-backup-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb102-mariadb-server-utils

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 5/21/2019

Vulnerability Publication Date: 10/17/2017

Reference Information

CVE: CVE-2017-10268, CVE-2017-10378, CVE-2017-15365, CVE-2018-2562, CVE-2018-2612, CVE-2018-2622, CVE-2018-2640, CVE-2018-2665, CVE-2018-2668, CVE-2018-2755, CVE-2018-2759, CVE-2018-2761, CVE-2018-2766, CVE-2018-2771, CVE-2018-2777, CVE-2018-2781, CVE-2018-2782, CVE-2018-2784, CVE-2018-2786, CVE-2018-2787, CVE-2018-2810, CVE-2018-2813, CVE-2018-2817, CVE-2018-2819, CVE-2018-3058, CVE-2018-3060, CVE-2018-3063, CVE-2018-3064, CVE-2018-3066, CVE-2018-3081, CVE-2018-3133, CVE-2018-3143, CVE-2018-3156, CVE-2018-3162, CVE-2018-3173, CVE-2018-3174, CVE-2018-3185, CVE-2018-3200, CVE-2018-3251, CVE-2018-3277, CVE-2018-3282, CVE-2018-3284, CVE-2019-2455, CVE-2019-2503, CVE-2019-2510, CVE-2019-2537, CVE-2020-14550

CWE: 284

RHSA: 2019:1258