160 lines
12 KiB
XML
160 lines
12 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
|
|
<DocumentTitle xml:lang="en">An update for mariadb is now available for openEuler-20.03-LTS-SP1</DocumentTitle>
|
|
<DocumentType>Security Advisory</DocumentType>
|
|
<DocumentPublisher Type="Vendor">
|
|
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
|
|
<IssuingAuthority>openEuler security committee</IssuingAuthority>
|
|
</DocumentPublisher>
|
|
<DocumentTracking>
|
|
<Identification>
|
|
<ID>openEuler-SA-2021-1250</ID>
|
|
</Identification>
|
|
<Status>Final</Status>
|
|
<Version>1.0</Version>
|
|
<RevisionHistory>
|
|
<Revision>
|
|
<Number>1.0</Number>
|
|
<Date>2021-07-03</Date>
|
|
<Description>Initial</Description>
|
|
</Revision>
|
|
</RevisionHistory>
|
|
<InitialReleaseDate>2021-07-03</InitialReleaseDate>
|
|
<CurrentReleaseDate>2021-07-03</CurrentReleaseDate>
|
|
<Generator>
|
|
<Engine>openEuler SA Tool V1.0</Engine>
|
|
<Date>2021-07-03</Date>
|
|
</Generator>
|
|
</DocumentTracking>
|
|
<DocumentNotes>
|
|
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">mariadb security update</Note>
|
|
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for mariadb is now available for openEuler-20.03-LTS-SP1.</Note>
|
|
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">MariaDB turns data into structured information in a wide array of applications, ranging from banking to websites. It is an enhanced, drop-in replacement for MySQL. MariaDB is used because it is fast, scalable and robust, with a rich ecosystem of storage engines, plugins and many other tools make it very versatile for a wide variety of use cases.
|
|
|
|
Security Fix(es):
|
|
|
|
A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.(CVE-2021-27928)
|
|
|
|
A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.(CVE-2020-15180)</Note>
|
|
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for mariadb is now available for openEuler-20.03-LTS-SP1.
|
|
|
|
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
|
|
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
|
|
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">mariadb</Note>
|
|
</DocumentNotes>
|
|
<DocumentReferences>
|
|
<Reference Type="Self">
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1250</URL>
|
|
</Reference>
|
|
<Reference Type="openEuler CVE">
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-27928</URL>
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-15180</URL>
|
|
</Reference>
|
|
<Reference Type="Other">
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-27928</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2020-15180</URL>
|
|
</Reference>
|
|
</DocumentReferences>
|
|
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
|
<Branch Type="Product Name" Name="openEuler">
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="aarch64">
|
|
<FullProductName ProductID="mariadb-common-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-common-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-cracklib-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-cracklib-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-debugsource-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-debugsource-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-oqgraph-engine-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-oqgraph-engine-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-embedded-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-embedded-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-gssapi-server-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-gssapi-server-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-server-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-server-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-devel-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-devel-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-server-galera-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-server-galera-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-backup-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-backup-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-debuginfo-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-debuginfo-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-embedded-devel-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-embedded-devel-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-errmessage-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-errmessage-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-test-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-test-10.3.9-11.oe1.aarch64.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="src">
|
|
<FullProductName ProductID="mariadb-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-10.3.9-11.oe1.src.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="x86_64">
|
|
<FullProductName ProductID="mariadb-gssapi-server-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-gssapi-server-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-oqgraph-engine-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-oqgraph-engine-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-devel-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-devel-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-cracklib-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-cracklib-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-debuginfo-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-debuginfo-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-errmessage-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-errmessage-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-common-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-common-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-debugsource-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-debugsource-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-embedded-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-embedded-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-server-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-server-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-server-galera-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-server-galera-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-embedded-devel-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-embedded-devel-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-test-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-test-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mariadb-backup-10.3.9-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mariadb-backup-10.3.9-11.oe1.x86_64.rpm</FullProductName>
|
|
</Branch>
|
|
</ProductTree>
|
|
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-07-03</ReleaseDate>
|
|
<CVE>CVE-2021-27928</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>7.2</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>mariadb security update</Description>
|
|
<DATE>2021-07-03</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1250</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-07-03</ReleaseDate>
|
|
<CVE>CVE-2020-15180</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Critical</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>9.0</BaseScore>
|
|
<Vector>AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>mariadb security update</Description>
|
|
<DATE>2021-07-03</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1250</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
</cvrfdoc> |