Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.851797 |
Categoría: | SuSE Local Security Checks |
Título: | openSUSE: Security Advisory for mariadb (openSUSE-SU-2018:1800-1) |
Resumen: | The remote host is missing an update for the 'mariadb'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'mariadb' package(s) announced via the referenced advisory. Vulnerability Insight: This update for MariaDB to version 10.0.35 fixes multiple issues: Security issues fixed: * CVE-2018-2782: Unspecified DoS vulnerability in InnoDB (bsc#1090518) * CVE-2018-2784: Unspecified DoS vulnerability in InnoDB (bsc#1090518) * CVE-2018-2787: Unspecified vulnerability in InnoDB allowing writes (bsc#1090518) * CVE-2018-2766: Unspecified DoS vulnerability InnoDB (bsc#1090518) * CVE-2018-2755: Unspecified vulnerability in Replication allowing server compromise (bsc#1090518) * CVE-2018-2819: Unspecified DoS vulnerability in InnoDB (bsc#1090518) * CVE-2018-2817: Unspecified DoS vulnerability in DDL (bsc#1090518) * CVE-2018-2761: Unspecified DoS vulnerability in Client programs (bsc#1090518) * CVE-2018-2781: Unspecified DoS vulnerability in Server/Optimizer (bsc#1090518) * CVE-2018-2771: Unspecified DoS vulnerability in the Server/Locking component (bsc#1090518) * CVE-2018-2813: Unspecified vulnerability in The DDL component allowing unauthorized reads (bsc#1090518) * CVE-2018-2767: The embedded server library now supports SSL when connecting to remote servers (bsc#1088681) The following changes are included: * XtraDB updated to 5.6.39-83.1 * TokuDB updated to 5.6.39-83.1 * InnoDB updated to 5.6.40 * Fix for Crash in MVCC read after IMPORT TABLESPACE * Fix for innodb_read_only trying to modify files if transactions were recovered in COMMITTED state * Fix for DROP TABLE hang on InnoDB table with FULLTEXT index * Fix for Crash in INFORMATION_SCHEMA.INNODB_SYS_TABLES whenaccessing corrupted record This update was imported from the SUSE:SLE-12-SP1:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-668=1 Affected Software/OS: mariadb on openSUSE Leap 42.3 Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-2755 BugTraq ID: 103807 http://www.securityfocus.com/bid/103807 Debian Security Information: DSA-4176 (Google Search) https://www.debian.org/security/2018/dsa-4176 Debian Security Information: DSA-4341 (Google Search) https://www.debian.org/security/2018/dsa-4341 https://security.gentoo.org/glsa/201908-24 https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html RedHat Security Advisories: RHSA-2018:1254 https://access.redhat.com/errata/RHSA-2018:1254 RedHat Security Advisories: RHSA-2018:2439 https://access.redhat.com/errata/RHSA-2018:2439 RedHat Security Advisories: RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:2729 RedHat Security Advisories: RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2018:3655 RedHat Security Advisories: RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:1258 http://www.securitytracker.com/id/1040698 https://usn.ubuntu.com/3629-1/ https://usn.ubuntu.com/3629-2/ https://usn.ubuntu.com/3629-3/ Common Vulnerability Exposure (CVE) ID: CVE-2018-2761 BugTraq ID: 103820 http://www.securityfocus.com/bid/103820 Common Vulnerability Exposure (CVE) ID: CVE-2018-2766 BugTraq ID: 103805 http://www.securityfocus.com/bid/103805 Common Vulnerability Exposure (CVE) ID: CVE-2018-2767 BugTraq ID: 103954 http://www.securityfocus.com/bid/103954 https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html http://www.securitytracker.com/id/1041294 https://usn.ubuntu.com/3725-1/ https://usn.ubuntu.com/3725-2/ Common Vulnerability Exposure (CVE) ID: CVE-2018-2771 BugTraq ID: 103828 http://www.securityfocus.com/bid/103828 Common Vulnerability Exposure (CVE) ID: CVE-2018-2781 BugTraq ID: 103825 http://www.securityfocus.com/bid/103825 Common Vulnerability Exposure (CVE) ID: CVE-2018-2782 BugTraq ID: 103799 http://www.securityfocus.com/bid/103799 Common Vulnerability Exposure (CVE) ID: CVE-2018-2784 BugTraq ID: 103801 http://www.securityfocus.com/bid/103801 Common Vulnerability Exposure (CVE) ID: CVE-2018-2787 BugTraq ID: 103804 http://www.securityfocus.com/bid/103804 Common Vulnerability Exposure (CVE) ID: CVE-2018-2813 BugTraq ID: 103830 http://www.securityfocus.com/bid/103830 Common Vulnerability Exposure (CVE) ID: CVE-2018-2817 BugTraq ID: 103818 http://www.securityfocus.com/bid/103818 Common Vulnerability Exposure (CVE) ID: CVE-2018-2819 BugTraq ID: 103814 http://www.securityfocus.com/bid/103814 |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |