ESB-2018.1905 - [Debian] MariaDB: Multiple vulnerabilities 2018-07-02

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1905
          [DLA 1407-1] mariadb-10.0 security update for Debian 8
                                2 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           MariaDB
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Denial of Service   -- Remote/Unauthenticated      
                   Unauthorised Access -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-2819 CVE-2018-2817 CVE-2018-2813
                   CVE-2018-2787 CVE-2018-2784 CVE-2018-2782
                   CVE-2018-2781 CVE-2018-2771 CVE-2018-2766
                   CVE-2018-2761 CVE-2018-2755 CVE-2018-2668
                   CVE-2018-2665 CVE-2018-2640 CVE-2018-2622
                   CVE-2018-2612 CVE-2018-2562 CVE-2017-10378
                   CVE-2017-10268  

Reference:         ASB-2018.0087
                   ESB-2018.1227
                   ESB-2018.0771
                   ESB-2018.0206

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : mariadb-10.0
Version        : 10.0.35-0+deb8u1
CVE ID         : CVE-2017-10268 CVE-2017-10378 CVE-2018-2562 CVE-2018-2612
                 CVE-2018-2622 CVE-2018-2640 CVE-2018-2665 CVE-2018-2668
                 CVE-2018-2755 CVE-2018-2761 CVE-2018-2766 CVE-2018-2771
                 CVE-2018-2781 CVE-2018-2782 CVE-2018-2784 CVE-2018-2787
                 CVE-2018-2813 CVE-2018-2817 CVE-2018-2819

Several issues have been discovered in the MariaDB database server. The
vulnerabilities are addressed by upgrading MariaDB to the new upstream
version 10.0.35. Please see the MariaDB 10.0 Release Notes for further
details:

 https://mariadb.com/kb/en/mariadb/mariadb-10033-release-notes/
 https://mariadb.com/kb/en/mariadb/mariadb-10034-release-notes/
 https://mariadb.com/kb/en/mariadb/mariadb-10035-release-notes/

For Debian 8 "Jessie", these problems have been fixed in version
10.0.35-0+deb8u1.

We recommend that you upgrade your mariadb-10.0 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=40Zg
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=G17a
-----END PGP SIGNATURE-----

« Back to bulletins