-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4408
                    USN-4195-2: MariaDB vulnerabilities
                             21 November 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           MariaDB
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-2974 CVE-2019-2938 

Reference:         ASB-2019.0296
                   ESB-2019.4373

Original Bulletin: 
   https://usn.ubuntu.com/4195-2/

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4195-2: MariaDB vulnerabilities
20 November 2019

mariadb vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:

  o Ubuntu 19.10
  o Ubuntu 19.04
  o Ubuntu 18.04 LTS

Summary

Several security issues were fixed in MariaDB

Software Description

  o mariadb-10.3 - MariaDB database
  o mariadb-10.1 - MariaDB database

Details

USN-4195-1 fixed multiple vulnerabilities in MySQL. This update provides the
corresponding fixes for CVE-2019-2974 in MariaDB 10.1 and CVE-2019-2938,
CVE-2019-2974 for MariaDB 10.3.

Ubuntu 18.04 LTS has been updated to MariaDB 10.1.43. Ubuntu 19.04 and 19.10
has been updated to MariaDB 10.3.20.

In addition to security fixes, the updated package contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information: https://mariadb.com/kb/en/
library/mariadb-10143-changelog/ https://mariadb.com/kb/en/library/
mariadb-10143-release-notes/ https://mariadb.com/kb/en/library/
mariadb-10320-changelog/ https://mariadb.com/kb/en/library/
mariadb-10320-release-notes/

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes new
upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.18 in Ubuntu 19.10. Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, and Ubuntu 19.04 have been updated to MySQL 5.7.28.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information: https://dev.mysql.com/doc/
relnotes/mysql/5.7/en/news-5-7-28.html https://dev.mysql.com/doc/relnotes/mysql
/8.0/en/news-8-0-18.html https://www.oracle.com/security-alerts/cpuoct2019.html

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 19.10
    libmariadb-dev - 1:10.3.20-0ubuntu0.19.10.1
    libmariadb-dev-compat - 1:10.3.20-0ubuntu0.19.10.1
    libmariadb3 - 1:10.3.20-0ubuntu0.19.10.1
    libmariadbclient-dev - 1:10.3.20-0ubuntu0.19.10.1
    libmariadbd-dev - 1:10.3.20-0ubuntu0.19.10.1
    libmariadbd19 - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-backup - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-client - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-client-10.3 - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-client-core-10.3 - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-common - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-connect - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-cracklib-password-check - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-gssapi-client - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-gssapi-server - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-mroonga - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-oqgraph - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-rocksdb - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-spider - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-plugin-tokudb - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-server - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-server-10.3 - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-server-core-10.3 - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-test - 1:10.3.20-0ubuntu0.19.10.1
    mariadb-test-data - 1:10.3.20-0ubuntu0.19.10.1
Ubuntu 19.04
    libmariadb-dev - 1:10.3.20-0ubuntu0.19.04.1
    libmariadb-dev-compat - 1:10.3.20-0ubuntu0.19.04.1
    libmariadb3 - 1:10.3.20-0ubuntu0.19.04.1
    libmariadbclient-dev - 1:10.3.20-0ubuntu0.19.04.1
    libmariadbd-dev - 1:10.3.20-0ubuntu0.19.04.1
    libmariadbd19 - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-backup - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-client - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-client-10.3 - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-client-core-10.3 - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-common - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-connect - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-cracklib-password-check - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-gssapi-client - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-gssapi-server - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-mroonga - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-oqgraph - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-rocksdb - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-spider - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-plugin-tokudb - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-server - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-server-10.3 - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-server-core-10.3 - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-test - 1:10.3.20-0ubuntu0.19.04.1
    mariadb-test-data - 1:10.3.20-0ubuntu0.19.04.1
Ubuntu 18.04 LTS
    libmariadbclient-dev - 1:10.1.43-0ubuntu0.18.04.1
    libmariadbclient-dev-compat - 1:10.1.43-0ubuntu0.18.04.1
    libmariadbclient18 - 1:10.1.43-0ubuntu0.18.04.1
    libmariadbd-dev - 1:10.1.43-0ubuntu0.18.04.1
    libmariadbd18 - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-client - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-client-10.1 - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-client-core-10.1 - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-common - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-plugin-connect - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-plugin-cracklib-password-check - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-plugin-gssapi-client - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-plugin-gssapi-server - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-plugin-mroonga - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-plugin-oqgraph - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-plugin-spider - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-plugin-tokudb - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-server - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-server-10.1 - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-server-core-10.1 - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-test - 1:10.1.43-0ubuntu0.18.04.1
    mariadb-test-data - 1:10.1.43-0ubuntu0.18.04.1

To update your system, please follow these instructions: https://
wiki.ubuntu.com/Security/Upgrades .

This update uses a new upstream release, which includes additional bug fixes.
After a standard system update will make all the necessary changes.

References

  o USN-4195-1
  o CVE-2019-2938
  o CVE-2019-2974

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=2cxF
-----END PGP SIGNATURE-----