Security update for mariadb

Announcement ID: SUSE-SU-2019:0119-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2016-9843 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2016-9843 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-3143 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3143 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3156 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3156 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3162 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3162 ( NVD ): 4.9 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3173 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3173 ( NVD ): 4.9 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3174 ( SUSE ): 5.3 CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
  • CVE-2018-3174 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
  • CVE-2018-3174 ( NVD ): 5.3 CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
  • CVE-2018-3185 ( NVD ): 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  • CVE-2018-3185 ( NVD ): 5.5 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  • CVE-2018-3200 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3200 ( NVD ): 4.9 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3251 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3251 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3251 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3277 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3277 ( NVD ): 4.9 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3282 ( SUSE ): 4.9 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3282 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3282 ( NVD ): 4.9 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3284 ( SUSE ): 4.4 CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3284 ( NVD ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-3284 ( NVD ): 4.4 CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • SUSE Linux Enterprise Desktop 12 SP4
  • SUSE Linux Enterprise High Performance Computing 12 SP4
  • SUSE Linux Enterprise Server 12 SP4
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4
  • SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP4

An update that solves 12 vulnerabilities and has five security fixes can now be installed.

Description:

This update for mariadb to version 10.2.19 fixes the following issues: (bsc#1116686)

Security issues fixed:

  • CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)
  • CVE-2018-3282, CVE-2018-3174, CVE-2018-3143, CVE-2018-3156, CVE-2018-3251, CVE-2018-3185, CVE-2018-3277, CVE-2018-3162, CVE-2018-3173, CVE-2018-3200, CVE-2018-3284: Fixed multiple denial of service vulnerabilities (bsc#1112432, bsc#1112368, bsc#1112421, bsc#1112417, bsc#1112397, bsc#1112391, bsc#1112415, bsc#1112386, bsc#1112404, bsc#1112377, bsc#1112384)

Non-security issues fixed:

  • Fixed database corruption after renaming a prefix-indexed column (bsc#1120041)
  • Remove PerconaFT from the package as it has a AGPL license (bsc#1118754)
  • Enable testing for client plugins (bsc#1111859)
  • Improve test coverage by keeping debug_key_management.so (bsc#1111858)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP4
    zypper in -t patch SUSE-SLE-BSK-12-SP4-2019-119=1
  • SUSE Linux Enterprise Desktop 12 SP4
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-119=1
  • SUSE Linux Enterprise High Performance Computing 12 SP4
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-119=1
  • SUSE Linux Enterprise Server 12 SP4
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-119=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-119=1

Package List:

  • SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP4 (ppc64le s390x x86_64)
    • mariadb-test-10.2.21-3.7.1
    • mariadb-bench-10.2.21-3.7.1
    • mariadb-bench-debuginfo-10.2.21-3.7.1
    • mariadb-test-debuginfo-10.2.21-3.7.1
  • SUSE Linux Enterprise Desktop 12 SP4 (x86_64)
    • mariadb-debugsource-10.2.21-3.7.1
    • mariadb-10.2.21-3.7.1
    • mariadb-client-debuginfo-10.2.21-3.7.1
    • mariadb-client-10.2.21-3.7.1
    • mariadb-debuginfo-10.2.21-3.7.1
  • SUSE Linux Enterprise Desktop 12 SP4 (noarch)
    • mariadb-errormessages-10.2.21-3.7.1
  • SUSE Linux Enterprise High Performance Computing 12 SP4 (aarch64 x86_64)
    • mariadb-debugsource-10.2.21-3.7.1
    • mariadb-10.2.21-3.7.1
    • mariadb-client-debuginfo-10.2.21-3.7.1
    • mariadb-tools-debuginfo-10.2.21-3.7.1
    • mariadb-tools-10.2.21-3.7.1
    • mariadb-client-10.2.21-3.7.1
    • mariadb-debuginfo-10.2.21-3.7.1
  • SUSE Linux Enterprise High Performance Computing 12 SP4 (noarch)
    • mariadb-errormessages-10.2.21-3.7.1
  • SUSE Linux Enterprise Server 12 SP4 (aarch64 ppc64le s390x x86_64)
    • mariadb-debugsource-10.2.21-3.7.1
    • mariadb-10.2.21-3.7.1
    • mariadb-client-debuginfo-10.2.21-3.7.1
    • mariadb-tools-debuginfo-10.2.21-3.7.1
    • mariadb-tools-10.2.21-3.7.1
    • mariadb-client-10.2.21-3.7.1
    • mariadb-debuginfo-10.2.21-3.7.1
  • SUSE Linux Enterprise Server 12 SP4 (noarch)
    • mariadb-errormessages-10.2.21-3.7.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4 (ppc64le x86_64)
    • mariadb-debugsource-10.2.21-3.7.1
    • mariadb-10.2.21-3.7.1
    • mariadb-client-debuginfo-10.2.21-3.7.1
    • mariadb-tools-debuginfo-10.2.21-3.7.1
    • mariadb-tools-10.2.21-3.7.1
    • mariadb-client-10.2.21-3.7.1
    • mariadb-debuginfo-10.2.21-3.7.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP4 (noarch)
    • mariadb-errormessages-10.2.21-3.7.1

References: