suse-su-2020:3625-1
Vulnerability from csaf_suse
Published
2020-12-04 11:52
Modified
2020-12-04 11:52
Summary
Security update for mariadb
Notes
Title of the patch
Security update for mariadb
Description of the patch
This update for mariadb includes the following fixes:
Security fixes included in this update:
- CVE-2020-2752: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2814: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2760: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-13249: Fixed an improper validation of the content of an OK packet received from a server.
- CVE-2020-14812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-14765: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-14776: Fixed an issue which could have resulted in unauthorized ability of accessing data.
- CVE-2020-14789: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-15180: Fixed an issue in Galera which could have led to remote code execution.
Non Security fixes included in this update:
- Update to 10.2.36 GA [bsc#1177472] and [bsc#1178428]
* release notes and changelog:
https://mariadb.com/kb/en/library/mariadb-10236-release-notes
https://mariadb.com/kb/en/library/mariadb-10236-changelog
https://mariadb.com/kb/en/library/mariadb-10235-release-notes
https://mariadb.com/kb/en/library/mariadb-10235-changelog
https://mariadb.com/kb/en/library/mariadb-10234-release-notes
https://mariadb.com/kb/en/library/mariadb-10234-changelog
* fixes for the following security vulnerabilities:
10.2.36: none
10.2.35: CVE-2020-14812, CVE-2020-14765, CVE-2020-14776,
CVE-2020-14789
10.2.34: CVE-2020-15180
- update suse_skipped_tests.list
- Update to 10.2.33 GA [bsc#1175596]
* release notes and changelog:
https://mariadb.com/kb/en/library/mariadb-10233-release-notes
https://mariadb.com/kb/en/library/mariadb-10233-changelog
* fixes for the following security vulnerabilities: none
- refresh mariadb-10.2.4-fortify-and-O.patch
- tune the testsuite to avoid randomly failing tests
- update suse_skipped_tests.list
- Update to 10.2.32 GA [bsc#1171550]
* Fixes for the following security vulnerabilities:
CVE-2020-2752, CVE-2020-2812, CVE-2020-2814, CVE-2020-2760,
CVE-2020-13249
* release notes and changelog:
https://mariadb.com/kb/en/library/mariadb-10232-release-notes
https://mariadb.com/kb/en/library/mariadb-10232-changelog
- refresh mariadb-10.2.4-fortify-and-O.patch
- drop specfile 'hacks' as things work correctly in upstream now:
* renaming tmpfiles.conf -> mariadb.conf
* installing pam_user_map.so to /lib64/security for non 32bit
architectures
* sysusers.conf was renamed to mariadb.conf
- update suse_skipped_tests.list
Patchnames
SUSE-2020-3625,SUSE-OpenStack-Cloud-7-2020-3625
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for mariadb", "title": "Title of the patch" }, { "category": "description", "text": "This update for mariadb includes the following fixes:\n\nSecurity fixes included in this update:\n\n- CVE-2020-2752: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.\n- CVE-2020-2812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.\n- CVE-2020-2814: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.\n- CVE-2020-2760: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.\n- CVE-2020-13249: Fixed an improper validation of the content of an OK packet received from a server.\n- CVE-2020-14812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.\n- CVE-2020-14765: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.\n- CVE-2020-14776: Fixed an issue which could have resulted in unauthorized ability of accessing data.\n- CVE-2020-14789: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.\n- CVE-2020-15180: Fixed an issue in Galera which could have led to remote code execution.\n\n\nNon Security fixes included in this update:\n\n- Update to 10.2.36 GA [bsc#1177472] and [bsc#1178428]\n * release notes and changelog:\n https://mariadb.com/kb/en/library/mariadb-10236-release-notes\n https://mariadb.com/kb/en/library/mariadb-10236-changelog\n https://mariadb.com/kb/en/library/mariadb-10235-release-notes\n https://mariadb.com/kb/en/library/mariadb-10235-changelog\n https://mariadb.com/kb/en/library/mariadb-10234-release-notes\n https://mariadb.com/kb/en/library/mariadb-10234-changelog\n * fixes for the following security vulnerabilities:\n 10.2.36: none\n 10.2.35: CVE-2020-14812, CVE-2020-14765, CVE-2020-14776,\n CVE-2020-14789\n 10.2.34: CVE-2020-15180\n- update suse_skipped_tests.list\n\n- Update to 10.2.33 GA [bsc#1175596]\n * release notes and changelog:\n https://mariadb.com/kb/en/library/mariadb-10233-release-notes\n https://mariadb.com/kb/en/library/mariadb-10233-changelog\n * fixes for the following security vulnerabilities: none\n- refresh mariadb-10.2.4-fortify-and-O.patch\n- tune the testsuite to avoid randomly failing tests\n- update suse_skipped_tests.list\n\n- Update to 10.2.32 GA [bsc#1171550]\n * Fixes for the following security vulnerabilities:\n CVE-2020-2752, CVE-2020-2812, CVE-2020-2814, CVE-2020-2760,\n CVE-2020-13249\n * release notes and changelog:\n https://mariadb.com/kb/en/library/mariadb-10232-release-notes\n https://mariadb.com/kb/en/library/mariadb-10232-changelog\n- refresh mariadb-10.2.4-fortify-and-O.patch\n- drop specfile \u0027hacks\u0027 as things work correctly in upstream now:\n * renaming tmpfiles.conf -\u003e mariadb.conf\n * installing pam_user_map.so to /lib64/security for non 32bit\n architectures\n * sysusers.conf was renamed to mariadb.conf\n- update suse_skipped_tests.list\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3625,SUSE-OpenStack-Cloud-7-2020-3625", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3625-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3625-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203625-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3625-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" }, { "category": "self", "summary": "SUSE Bug 1171550", "url": "https://bugzilla.suse.com/1171550" }, { "category": "self", "summary": "SUSE Bug 1175596", "url": "https://bugzilla.suse.com/1175596" }, { "category": "self", "summary": "SUSE Bug 1177472", "url": "https://bugzilla.suse.com/1177472" }, { "category": "self", "summary": "SUSE Bug 1178428", "url": "https://bugzilla.suse.com/1178428" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13249 page", "url": "https://www.suse.com/security/cve/CVE-2020-13249/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14765 page", "url": "https://www.suse.com/security/cve/CVE-2020-14765/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14776 page", "url": "https://www.suse.com/security/cve/CVE-2020-14776/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14789 page", "url": "https://www.suse.com/security/cve/CVE-2020-14789/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14812 page", "url": "https://www.suse.com/security/cve/CVE-2020-14812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15180 page", "url": "https://www.suse.com/security/cve/CVE-2020-15180/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2752 page", "url": "https://www.suse.com/security/cve/CVE-2020-2752/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2760 page", "url": "https://www.suse.com/security/cve/CVE-2020-2760/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2812 page", "url": "https://www.suse.com/security/cve/CVE-2020-2812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2814 page", "url": "https://www.suse.com/security/cve/CVE-2020-2814/" } ], "title": "Security update for mariadb", "tracking": { "current_release_date": "2020-12-04T11:52:48Z", "generator": { "date": "2020-12-04T11:52:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3625-1", "initial_release_date": "2020-12-04T11:52:48Z", "revision_history": [ { "date": "2020-12-04T11:52:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libmysqld-devel-10.2.36-19.1.aarch64", "product": { "name": "libmysqld-devel-10.2.36-19.1.aarch64", "product_id": "libmysqld-devel-10.2.36-19.1.aarch64" } }, { "category": "product_version", "name": "libmysqld19-10.2.36-19.1.aarch64", "product": { "name": "libmysqld19-10.2.36-19.1.aarch64", "product_id": "libmysqld19-10.2.36-19.1.aarch64" } }, { "category": "product_version", "name": "mariadb-10.2.36-19.1.aarch64", "product": { "name": "mariadb-10.2.36-19.1.aarch64", "product_id": "mariadb-10.2.36-19.1.aarch64" } }, { "category": "product_version", "name": "mariadb-bench-10.2.36-19.1.aarch64", "product": { "name": "mariadb-bench-10.2.36-19.1.aarch64", "product_id": "mariadb-bench-10.2.36-19.1.aarch64" } }, { "category": "product_version", "name": "mariadb-client-10.2.36-19.1.aarch64", "product": { "name": "mariadb-client-10.2.36-19.1.aarch64", "product_id": "mariadb-client-10.2.36-19.1.aarch64" } }, { "category": "product_version", "name": "mariadb-galera-10.2.36-19.1.aarch64", "product": { "name": "mariadb-galera-10.2.36-19.1.aarch64", "product_id": "mariadb-galera-10.2.36-19.1.aarch64" } }, { "category": "product_version", "name": "mariadb-test-10.2.36-19.1.aarch64", "product": { "name": "mariadb-test-10.2.36-19.1.aarch64", "product_id": "mariadb-test-10.2.36-19.1.aarch64" } }, { "category": "product_version", "name": "mariadb-tools-10.2.36-19.1.aarch64", "product": { "name": "mariadb-tools-10.2.36-19.1.aarch64", "product_id": "mariadb-tools-10.2.36-19.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "mariadb-errormessages-10.2.36-19.1.noarch", "product": { "name": "mariadb-errormessages-10.2.36-19.1.noarch", "product_id": "mariadb-errormessages-10.2.36-19.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libmysqld-devel-10.2.36-19.1.ppc64le", "product": { "name": "libmysqld-devel-10.2.36-19.1.ppc64le", "product_id": "libmysqld-devel-10.2.36-19.1.ppc64le" } }, { "category": "product_version", "name": "libmysqld19-10.2.36-19.1.ppc64le", "product": { "name": "libmysqld19-10.2.36-19.1.ppc64le", "product_id": "libmysqld19-10.2.36-19.1.ppc64le" } }, { "category": "product_version", "name": "mariadb-10.2.36-19.1.ppc64le", "product": { "name": "mariadb-10.2.36-19.1.ppc64le", "product_id": "mariadb-10.2.36-19.1.ppc64le" } }, { "category": "product_version", "name": "mariadb-bench-10.2.36-19.1.ppc64le", "product": { "name": "mariadb-bench-10.2.36-19.1.ppc64le", "product_id": "mariadb-bench-10.2.36-19.1.ppc64le" } }, { "category": "product_version", "name": "mariadb-client-10.2.36-19.1.ppc64le", "product": { "name": "mariadb-client-10.2.36-19.1.ppc64le", "product_id": "mariadb-client-10.2.36-19.1.ppc64le" } }, { "category": "product_version", "name": "mariadb-galera-10.2.36-19.1.ppc64le", "product": { "name": "mariadb-galera-10.2.36-19.1.ppc64le", "product_id": "mariadb-galera-10.2.36-19.1.ppc64le" } }, { "category": "product_version", "name": "mariadb-test-10.2.36-19.1.ppc64le", "product": { "name": "mariadb-test-10.2.36-19.1.ppc64le", "product_id": "mariadb-test-10.2.36-19.1.ppc64le" } }, { "category": "product_version", "name": "mariadb-tools-10.2.36-19.1.ppc64le", "product": { "name": "mariadb-tools-10.2.36-19.1.ppc64le", "product_id": "mariadb-tools-10.2.36-19.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libmysqld-devel-10.2.36-19.1.s390x", "product": { "name": "libmysqld-devel-10.2.36-19.1.s390x", "product_id": "libmysqld-devel-10.2.36-19.1.s390x" } }, { "category": "product_version", "name": "libmysqld19-10.2.36-19.1.s390x", "product": { "name": "libmysqld19-10.2.36-19.1.s390x", "product_id": "libmysqld19-10.2.36-19.1.s390x" } }, { "category": "product_version", "name": "mariadb-10.2.36-19.1.s390x", "product": { "name": "mariadb-10.2.36-19.1.s390x", "product_id": "mariadb-10.2.36-19.1.s390x" } }, { "category": "product_version", "name": "mariadb-bench-10.2.36-19.1.s390x", "product": { "name": "mariadb-bench-10.2.36-19.1.s390x", "product_id": "mariadb-bench-10.2.36-19.1.s390x" } }, { "category": "product_version", "name": "mariadb-client-10.2.36-19.1.s390x", "product": { "name": "mariadb-client-10.2.36-19.1.s390x", "product_id": "mariadb-client-10.2.36-19.1.s390x" } }, { "category": "product_version", "name": "mariadb-galera-10.2.36-19.1.s390x", "product": { "name": "mariadb-galera-10.2.36-19.1.s390x", "product_id": "mariadb-galera-10.2.36-19.1.s390x" } }, { "category": "product_version", "name": "mariadb-test-10.2.36-19.1.s390x", "product": { "name": "mariadb-test-10.2.36-19.1.s390x", "product_id": "mariadb-test-10.2.36-19.1.s390x" } }, { "category": "product_version", "name": "mariadb-tools-10.2.36-19.1.s390x", "product": { "name": "mariadb-tools-10.2.36-19.1.s390x", "product_id": "mariadb-tools-10.2.36-19.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libmysqld-devel-10.2.36-19.1.x86_64", "product": { "name": "libmysqld-devel-10.2.36-19.1.x86_64", "product_id": "libmysqld-devel-10.2.36-19.1.x86_64" } }, { "category": "product_version", "name": "libmysqld19-10.2.36-19.1.x86_64", "product": { "name": "libmysqld19-10.2.36-19.1.x86_64", "product_id": "libmysqld19-10.2.36-19.1.x86_64" } }, { "category": "product_version", "name": "mariadb-10.2.36-19.1.x86_64", "product": { "name": "mariadb-10.2.36-19.1.x86_64", "product_id": "mariadb-10.2.36-19.1.x86_64" } }, { "category": "product_version", "name": "mariadb-bench-10.2.36-19.1.x86_64", "product": { "name": "mariadb-bench-10.2.36-19.1.x86_64", "product_id": "mariadb-bench-10.2.36-19.1.x86_64" } }, { "category": "product_version", "name": "mariadb-client-10.2.36-19.1.x86_64", "product": { "name": "mariadb-client-10.2.36-19.1.x86_64", "product_id": "mariadb-client-10.2.36-19.1.x86_64" } }, { "category": "product_version", "name": "mariadb-galera-10.2.36-19.1.x86_64", "product": { "name": "mariadb-galera-10.2.36-19.1.x86_64", "product_id": "mariadb-galera-10.2.36-19.1.x86_64" } }, { "category": "product_version", "name": "mariadb-test-10.2.36-19.1.x86_64", "product": { "name": "mariadb-test-10.2.36-19.1.x86_64", "product_id": "mariadb-test-10.2.36-19.1.x86_64" } }, { "category": "product_version", "name": "mariadb-tools-10.2.36-19.1.x86_64", "product": { "name": "mariadb-tools-10.2.36-19.1.x86_64", "product_id": "mariadb-tools-10.2.36-19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mariadb-10.2.36-19.1.aarch64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64" }, "product_reference": "mariadb-10.2.36-19.1.aarch64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-10.2.36-19.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x" }, "product_reference": "mariadb-10.2.36-19.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-10.2.36-19.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64" }, "product_reference": "mariadb-10.2.36-19.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-client-10.2.36-19.1.aarch64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64" }, "product_reference": "mariadb-client-10.2.36-19.1.aarch64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-client-10.2.36-19.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x" }, "product_reference": "mariadb-client-10.2.36-19.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-client-10.2.36-19.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64" }, "product_reference": "mariadb-client-10.2.36-19.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-errormessages-10.2.36-19.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch" }, "product_reference": "mariadb-errormessages-10.2.36-19.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-galera-10.2.36-19.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64" }, "product_reference": "mariadb-galera-10.2.36-19.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-tools-10.2.36-19.1.aarch64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64" }, "product_reference": "mariadb-tools-10.2.36-19.1.aarch64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-tools-10.2.36-19.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x" }, "product_reference": "mariadb-tools-10.2.36-19.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "mariadb-tools-10.2.36-19.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" }, "product_reference": "mariadb-tools-10.2.36-19.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13249" } ], "notes": [ { "category": "general", "text": "libmariadb/mariadb_lib.c in MariaDB Connector/C before 3.1.8 does not properly validate the content of an OK packet received from a server. NOTE: although mariadb_lib.c was originally based on code shipped for MySQL, this issue does not affect any MySQL components supported by Oracle.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13249", "url": "https://www.suse.com/security/cve/CVE-2020-13249" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-13249" }, { "cve": "CVE-2020-14765", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14765" } ], "notes": [ { "category": "general", "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14765", "url": "https://www.suse.com/security/cve/CVE-2020-14765" }, { "category": "external", "summary": "SUSE Bug 1178428 for CVE-2020-14765", "url": "https://bugzilla.suse.com/1178428" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-14765" }, { "cve": "CVE-2020-14776", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14776" } ], "notes": [ { "category": "general", "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14776", "url": "https://www.suse.com/security/cve/CVE-2020-14776" }, { "category": "external", "summary": "SUSE Bug 1178428 for CVE-2020-14776", "url": "https://bugzilla.suse.com/1178428" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-14776" }, { "cve": "CVE-2020-14789", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14789" } ], "notes": [ { "category": "general", "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14789", "url": "https://www.suse.com/security/cve/CVE-2020-14789" }, { "category": "external", "summary": "SUSE Bug 1178428 for CVE-2020-14789", "url": "https://bugzilla.suse.com/1178428" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-14789" }, { "cve": "CVE-2020-14812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14812" } ], "notes": [ { "category": "general", "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14812", "url": "https://www.suse.com/security/cve/CVE-2020-14812" }, { "category": "external", "summary": "SUSE Bug 1178428 for CVE-2020-14812", "url": "https://bugzilla.suse.com/1178428" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-14812" }, { "cve": "CVE-2020-15180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15180" } ], "notes": [ { "category": "general", "text": "A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system\u0027s confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15180", "url": "https://www.suse.com/security/cve/CVE-2020-15180" }, { "category": "external", "summary": "SUSE Bug 1177472 for CVE-2020-15180", "url": "https://bugzilla.suse.com/1177472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "critical" } ], "title": "CVE-2020-15180" }, { "cve": "CVE-2020-2752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2752" } ], "notes": [ { "category": "general", "text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2752", "url": "https://www.suse.com/security/cve/CVE-2020-2752" }, { "category": "external", "summary": "SUSE Bug 1171550 for CVE-2020-2752", "url": "https://bugzilla.suse.com/1171550" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-2752" }, { "cve": "CVE-2020-2760", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2760" } ], "notes": [ { "category": "general", "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2760", "url": "https://www.suse.com/security/cve/CVE-2020-2760" }, { "category": "external", "summary": "SUSE Bug 1171550 for CVE-2020-2760", "url": "https://bugzilla.suse.com/1171550" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-2760" }, { "cve": "CVE-2020-2812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2812" } ], "notes": [ { "category": "general", "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2812", "url": "https://www.suse.com/security/cve/CVE-2020-2812" }, { "category": "external", "summary": "SUSE Bug 1171550 for CVE-2020-2812", "url": "https://bugzilla.suse.com/1171550" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-2812" }, { "cve": "CVE-2020-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.47 and prior, 5.7.28 and prior and 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2814", "url": "https://www.suse.com/security/cve/CVE-2020-2814" }, { "category": "external", "summary": "SUSE Bug 1171550 for CVE-2020-2814", "url": "https://bugzilla.suse.com/1171550" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-client-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.36-19.1.noarch", "SUSE OpenStack Cloud 7:mariadb-galera-10.2.36-19.1.x86_64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.aarch64", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.s390x", "SUSE OpenStack Cloud 7:mariadb-tools-10.2.36-19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-04T11:52:48Z", "details": "moderate" } ], "title": "CVE-2020-2814" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…