Ubuntu 18.04 LTS / 19.04 / 19.10 : MariaDB vulnerabilities (USN-4195-2)

Medium Nessus Plugin ID 131182

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3.6

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-4195-1 fixed multiple vulnerabilities in MySQL. This update provides the corresponding fixes for CVE-2019-2974 in MariaDB 10.1 and CVE-2019-2938, CVE-2019-2974 for MariaDB 10.3.

Ubuntu 18.04 LTS has been updated to MariaDB 10.1.43. Ubuntu 19.04 and 19.10 has been updated to MariaDB 10.3.20.

In addition to security fixes, the updated package contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information:
https://mariadb.com/kb/en/library/mariadb-10143-changelog/ https://mariadb.com/kb/en/library/mariadb-10143-release-notes/ https://mariadb.com/kb/en/library/mariadb-10320-changelog/ https://mariadb.com/kb/en/library/mariadb-10320-release-notes/

Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.18 in Ubuntu 19.10. Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 19.04 have been updated to MySQL 5.7.28.

In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-28.html https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-18.html https://www.oracle.com/security-alerts/cpuoct2019.html

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://usn.ubuntu.com/4195-2/

Plugin Details

Severity: Medium

ID: 131182

File Name: ubuntu_USN-4195-2.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2019/11/21

Updated: 2020/09/17

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 3.6

CVSS v2.0

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:libmariadb-dev, p-cpe:/a:canonical:ubuntu_linux:libmariadb-dev-compat, p-cpe:/a:canonical:ubuntu_linux:libmariadb3, p-cpe:/a:canonical:ubuntu_linux:libmariadbclient-dev, p-cpe:/a:canonical:ubuntu_linux:libmariadbclient-dev-compat, p-cpe:/a:canonical:ubuntu_linux:libmariadbclient18, p-cpe:/a:canonical:ubuntu_linux:libmariadbd-dev, p-cpe:/a:canonical:ubuntu_linux:libmariadbd18, p-cpe:/a:canonical:ubuntu_linux:libmariadbd19, p-cpe:/a:canonical:ubuntu_linux:mariadb-backup, p-cpe:/a:canonical:ubuntu_linux:mariadb-client, p-cpe:/a:canonical:ubuntu_linux:mariadb-client-10.1, p-cpe:/a:canonical:ubuntu_linux:mariadb-client-10.3, p-cpe:/a:canonical:ubuntu_linux:mariadb-client-core-10.1, p-cpe:/a:canonical:ubuntu_linux:mariadb-client-core-10.3, p-cpe:/a:canonical:ubuntu_linux:mariadb-common, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-connect, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-cracklib-password-check, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-gssapi-client, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-gssapi-server, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-mroonga, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-oqgraph, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-rocksdb, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-spider, p-cpe:/a:canonical:ubuntu_linux:mariadb-plugin-tokudb, p-cpe:/a:canonical:ubuntu_linux:mariadb-server, p-cpe:/a:canonical:ubuntu_linux:mariadb-server-10.1, p-cpe:/a:canonical:ubuntu_linux:mariadb-server-10.3, p-cpe:/a:canonical:ubuntu_linux:mariadb-server-core-10.1, p-cpe:/a:canonical:ubuntu_linux:mariadb-server-core-10.3, p-cpe:/a:canonical:ubuntu_linux:mariadb-test, p-cpe:/a:canonical:ubuntu_linux:mariadb-test-data, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, cpe:/o:canonical:ubuntu_linux:19.04, cpe:/o:canonical:ubuntu_linux:19.10

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 2019/11/20

Vulnerability Publication Date: 2019/10/16

Reference Information

CVE: CVE-2019-2938, CVE-2019-2974

USN: 4195-2