Vulnerabilities > CVE-2015-4757

047910
CVSS 3.5 - LOW
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL

Summary

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.

Vulnerable Configurations

Part Description Count
OS
Canonical
4
OS
Debian
1
OS
Opensuse
2
OS
Redhat
20
Application
Oracle
69
Application
Mariadb
33

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-608.NASL
    descriptionThe MySQL Community Server edition was updated to 5.6.26, fixing security issues and bugs. All changes: http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-26.html - Fixed CVEs: CVE-2015-2617, CVE-2015-2648, CVE-2015-2611, CVE-2015-2582 CVE-2015-4752, CVE-2015-4756, CVE-2015-2643, CVE-2015-4772 CVE-2015-4761, CVE-2015-4757, CVE-2015-4737, CVE-2015-4771 CVE-2015-4769, CVE-2015-2639, CVE-2015-2620, CVE-2015-2641 CVE-2015-2661, CVE-2015-4767 - disable Performance Schema by default. Since MySQL 5.6.6 upstream enabled Performance Schema by default which results in increased memory usage. The added option disable Performance Schema again in order to decrease MySQL memory usage [bnc#852477]. - install INFO_BIN and INFO_SRC, noticed in MDEV-6912 - remove superfluous
    last seen2020-06-05
    modified2015-09-28
    plugin id86182
    published2015-09-28
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86182
    titleopenSUSE Security Update : mysql-community-server (openSUSE-2015-608)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2015-608.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86182);
      script_version("2.6");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2015-2582", "CVE-2015-2611", "CVE-2015-2617", "CVE-2015-2620", "CVE-2015-2639", "CVE-2015-2641", "CVE-2015-2643", "CVE-2015-2648", "CVE-2015-2661", "CVE-2015-4737", "CVE-2015-4752", "CVE-2015-4756", "CVE-2015-4757", "CVE-2015-4761", "CVE-2015-4767", "CVE-2015-4769", "CVE-2015-4771", "CVE-2015-4772");
    
      script_name(english:"openSUSE Security Update : mysql-community-server (openSUSE-2015-608)");
      script_summary(english:"Check for the openSUSE-2015-608 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The MySQL Community Server edition was updated to 5.6.26, fixing
    security issues and bugs.
    
    All changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-26.html
    
      - Fixed CVEs: CVE-2015-2617, CVE-2015-2648, CVE-2015-2611,
        CVE-2015-2582 CVE-2015-4752, CVE-2015-4756,
        CVE-2015-2643, CVE-2015-4772 CVE-2015-4761,
        CVE-2015-4757, CVE-2015-4737, CVE-2015-4771
        CVE-2015-4769, CVE-2015-2639, CVE-2015-2620,
        CVE-2015-2641 CVE-2015-2661, CVE-2015-4767
    
      - disable Performance Schema by default. Since MySQL 5.6.6
        upstream enabled Performance Schema by default which
        results in increased memory usage. The added option
        disable Performance Schema again in order to decrease
        MySQL memory usage [bnc#852477].
    
      - install INFO_BIN and INFO_SRC, noticed in MDEV-6912
    
      - remove superfluous '--group' parameter from
        mysql-systemd-helper
    
      - make -devel package installable in the presence of
        LibreSSL
    
      - cleanup after the update-message if it was displayed
    
      - add 'exec' to mysql-systemd-helper to shutdown
        mysql/mariadb cleanly [bnc#943096]"
      );
      # http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-26.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-26.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=852477"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=902396"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=938412"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=942908"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=943096"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected mysql-community-server packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client18");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client18-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client18-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client18-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client_r18");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmysql56client_r18-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-bench");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-bench-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-client-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-errormessages");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-test");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-test-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mysql-community-server-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/28");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.1|SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1 / 13.2", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.1", reference:"libmysql56client18-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libmysql56client18-debuginfo-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libmysql56client_r18-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-bench-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-bench-debuginfo-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-client-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-client-debuginfo-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-debuginfo-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-debugsource-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-errormessages-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-test-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-test-debuginfo-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-tools-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"mysql-community-server-tools-debuginfo-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libmysql56client18-32bit-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libmysql56client18-debuginfo-32bit-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libmysql56client_r18-32bit-5.6.26-7.10.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libmysql56client18-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libmysql56client18-debuginfo-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libmysql56client_r18-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-bench-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-bench-debuginfo-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-client-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-client-debuginfo-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-debuginfo-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-debugsource-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-errormessages-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-test-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-test-debuginfo-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-tools-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"mysql-community-server-tools-debuginfo-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", cpu:"x86_64", reference:"libmysql56client18-32bit-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", cpu:"x86_64", reference:"libmysql56client18-debuginfo-32bit-5.6.26-2.9.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", cpu:"x86_64", reference:"libmysql56client_r18-32bit-5.6.26-2.9.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libmysql56client18-32bit / libmysql56client18 / etc");
    }
    
  • NASL familyDatabases
    NASL idMYSQL_5_6_25.NASL
    descriptionThe version of MySQL running on the remote host is version 5.5.x prior to 5.5.44 or version 5.6.x prior to 5.6.25. It is, therefore, potentially affected by the following vulnerabilities : - Multiple denial of service vulnerabilities exist in the following Server subcomponents which can be exploited by a remote, authenticated attacker : - Partition (CVE-2015-2617) - DML (CVE-2015-2648, CVE-2015-2611) - GIS (CVE-2015-2582) - I_S (CVE-2015-4752) - InnoDB (CVE-2015-4756) - Optimizer (CVE-2015-2643, CVE-2015-4757) - Partition (CVE-2015-4772) - Memcached (CVE-2015-4761) - RBR (CVE-2015-4771) - Security:Firewall (CVE-2015-4769, CVE-2015-4767) - Security:Privileges (CVE-2015-2641) - Multiple Information disclosure vulnerabilities exist in the following Server subcomponents which can be exploited by a remote, authenticated attacker to gain access to sensitive information : - Pluggable Auth (CVE-2015-4737) - Security:Privileges (CVE-2015-2620) - An unspecified vulnerability exists related to the Security:Firewall subcomponent of the Server that can be exploited by a remote, authenticated attacker to have an impact on the integrity of the system. (CVE-2015-2639) - A denial of service vulnerability exists in the Client subcomponent which can be exploited by a local attacker. No other details have been given. (CVE-2015-2661)
    last seen2020-06-01
    modified2020-06-02
    plugin id84767
    published2015-07-15
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84767
    titleMySQL 5.5.x < 5.5.44 / 5.6.x < 5.6.25 Multiple Vulnerabilities (July 2015 CPU)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(84767);
      script_version("1.12");
      script_cvs_date("Date: 2019/03/27 13:17:50");
    
      script_cve_id(
        "CVE-2015-2582",
        "CVE-2015-2611",
        "CVE-2015-2617",
        "CVE-2015-2620",
        "CVE-2015-2639",
        "CVE-2015-2641",
        "CVE-2015-2643",
        "CVE-2015-2648",
        "CVE-2015-2661",
        "CVE-2015-4737",
        "CVE-2015-4752",
        "CVE-2015-4756",
        "CVE-2015-4757",
        "CVE-2015-4761",
        "CVE-2015-4767",
        "CVE-2015-4769",
        "CVE-2015-4771",
        "CVE-2015-4772");
    
      script_bugtraq_id(
        75751,
        75753,
        75759,
        75760,
        75762,
        75770,
        75774,
        75781,
        75785,
        75802,
        75813,
        75815,
        75822,
        75830,
        75835,
        75837,
        75844,
        75849
      );
    
      script_name(english:"MySQL 5.5.x < 5.5.44 / 5.6.x < 5.6.25 Multiple Vulnerabilities (July 2015 CPU)");
      script_summary(english:"Checks the version of MySQL server.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote database server is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of MySQL running on the remote host is version 5.5.x
    prior to 5.5.44 or version 5.6.x prior to 5.6.25. It is, therefore,
    potentially affected by the following vulnerabilities :
    
      - Multiple denial of service vulnerabilities exist in the
        following Server subcomponents which can be exploited by
        a remote, authenticated attacker :
        - Partition (CVE-2015-2617)
        - DML (CVE-2015-2648, CVE-2015-2611)
        - GIS (CVE-2015-2582)
        - I_S (CVE-2015-4752)
        - InnoDB (CVE-2015-4756)
        - Optimizer (CVE-2015-2643, CVE-2015-4757)
        - Partition (CVE-2015-4772)
        - Memcached (CVE-2015-4761)
        - RBR (CVE-2015-4771)
        - Security:Firewall (CVE-2015-4769, CVE-2015-4767)
        - Security:Privileges (CVE-2015-2641)
    
      - Multiple Information disclosure vulnerabilities exist in
        the following Server subcomponents which can be
        exploited by a remote, authenticated attacker to gain
        access to sensitive information :
        - Pluggable Auth (CVE-2015-4737)
        - Security:Privileges (CVE-2015-2620)
    
      - An unspecified vulnerability exists related to the
        Security:Firewall subcomponent of the Server that can be
        exploited by a remote, authenticated attacker to have an
        impact on the integrity of the system. (CVE-2015-2639)
    
      - A denial of service vulnerability exists in the Client
        subcomponent which can be exploited by a local attacker.
        No other details have been given. (CVE-2015-2661)");
      # http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d18c2a85");
      script_set_attribute(attribute:"see_also", value:"https://dev.mysql.com/doc/relnotes/mysql/5.5/en/");
      script_set_attribute(attribute:"see_also", value:"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/");
      script_set_attribute(attribute:"solution", value:
    "Apply the appropriate patch according to the July 2015 Oracle
    Critical Patch Update advisory.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-2617");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/07/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/07/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/07/15");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:mysql");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Databases");
    
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("mysql_version.nasl", "mysql_login.nasl");
      script_require_keys("Settings/ParanoidReport");
      script_require_ports("Services/mysql", 3306);
    
      exit(0);
    }
    
    include("mysql_version.inc");
    
    mysql_check_version(fixed:make_list('5.5.44', '5.6.25'), severity:SECURITY_WARNING);
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3311.NASL
    descriptionSeveral issues have been discovered in the MariaDB database server. The vulnerabilities are addressed by upgrading MariaDB to the new upstream version 10.0.20. Please see the MariaDB 10.0 Release Notes for further details : - https://mariadb.com/kb/en/mariadb/mariadb-10017-release- notes/ - https://mariadb.com/kb/en/mariadb/mariadb-10018-release- notes/ - https://mariadb.com/kb/en/mariadb/mariadb-10019-release- notes/ - https://mariadb.com/kb/en/mariadb/mariadb-10020-release- notes/
    last seen2020-06-01
    modified2020-06-02
    plugin id84839
    published2015-07-20
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84839
    titleDebian DSA-3311-1 : mariadb-10.0 - security update (BACKRONYM)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-3311. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(84839);
      script_version("2.15");
      script_cvs_date("Date: 2018/11/19 11:02:41");
    
      script_cve_id("CVE-2015-0433", "CVE-2015-0441", "CVE-2015-0499", "CVE-2015-0501", "CVE-2015-0505", "CVE-2015-2568", "CVE-2015-2571", "CVE-2015-2573", "CVE-2015-2582", "CVE-2015-2643", "CVE-2015-2648", "CVE-2015-3152", "CVE-2015-4752", "CVE-2015-4757");
      script_bugtraq_id(74070, 74073, 74078, 74089, 74095, 74103, 74112, 74115);
      script_xref(name:"DSA", value:"3311");
    
      script_name(english:"Debian DSA-3311-1 : mariadb-10.0 - security update (BACKRONYM)");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several issues have been discovered in the MariaDB database server.
    The vulnerabilities are addressed by upgrading MariaDB to the new
    upstream version 10.0.20. Please see the MariaDB 10.0 Release Notes
    for further details :
    
      -
        https://mariadb.com/kb/en/mariadb/mariadb-10017-release-
        notes/
      -
        https://mariadb.com/kb/en/mariadb/mariadb-10018-release-
        notes/
    
      -
        https://mariadb.com/kb/en/mariadb/mariadb-10019-release-
        notes/
    
      -
        https://mariadb.com/kb/en/mariadb/mariadb-10020-release-
        notes/"
      );
      # https://mariadb.com/kb/en/mariadb/mariadb-10017-release-notes/
      script_set_attribute(
        attribute:"see_also",
        value:"https://mariadb.com/kb/en/library/mariadb-10017-release-notes/"
      );
      # https://mariadb.com/kb/en/mariadb/mariadb-10018-release-notes/
      script_set_attribute(
        attribute:"see_also",
        value:"https://mariadb.com/kb/en/library/mariadb-10018-release-notes/"
      );
      # https://mariadb.com/kb/en/mariadb/mariadb-10019-release-notes/
      script_set_attribute(
        attribute:"see_also",
        value:"https://mariadb.com/kb/en/library/mariadb-10019-release-notes/"
      );
      # https://mariadb.com/kb/en/mariadb/mariadb-10020-release-notes/
      script_set_attribute(
        attribute:"see_also",
        value:"https://mariadb.com/kb/en/library/mariadb-10020-release-notes/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/jessie/mariadb-10.0"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2015/dsa-3311"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the mariadb-10.0 packages.
    
    For the stable distribution (jessie), these problems have been fixed
    in version 10.0.20-0+deb8u1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:M/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:mariadb-10.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/07/20");
      script_set_attribute(attribute:"in_the_news", value:"true");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/07/20");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"8.0", prefix:"libmariadbd-dev", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-client", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-client-10.0", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-client-core-10.0", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-common", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-connect-engine-10.0", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-oqgraph-engine-10.0", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-server", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-server-10.0", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-server-core-10.0", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-test", reference:"10.0.20-0+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"mariadb-test-10.0", reference:"10.0.20-0+deb8u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1628.NASL
    descriptionUpdated mysql55-mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pages, listed in the References section. (CVE-2014-6568, CVE-2015-0374, CVE-2015-0381, CVE-2015-0382, CVE-2015-0391, CVE-2015-0411, CVE-2015-0432, CVE-2015-0433, CVE-2015-0441, CVE-2015-0499, CVE-2015-0501, CVE-2015-0505, CVE-2015-2568, CVE-2015-2571, CVE-2015-2573, CVE-2015-2582, CVE-2015-2620, CVE-2015-2643, CVE-2015-2648, CVE-2015-4737, CVE-2015-4752, CVE-2015-4757) These updated packages upgrade MySQL to version 5.5.45. Refer to the MySQL Release Notes listed in the References section for a complete list of changes. All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85443
    published2015-08-17
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85443
    titleRHEL 5 : mysql55-mysql (RHSA-2015:1628)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2015:1628. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85443);
      script_version("2.12");
      script_cvs_date("Date: 2019/10/24 15:35:40");
    
      script_cve_id("CVE-2014-6568", "CVE-2015-0374", "CVE-2015-0381", "CVE-2015-0382", "CVE-2015-0391", "CVE-2015-0411", "CVE-2015-0432", "CVE-2015-0433", "CVE-2015-0441", "CVE-2015-0499", "CVE-2015-0501", "CVE-2015-0505", "CVE-2015-2568", "CVE-2015-2571", "CVE-2015-2573", "CVE-2015-2582", "CVE-2015-2620", "CVE-2015-2643", "CVE-2015-2648", "CVE-2015-4737", "CVE-2015-4752", "CVE-2015-4757", "CVE-2015-4816", "CVE-2015-4819", "CVE-2015-4864", "CVE-2015-4879");
      script_xref(name:"RHSA", value:"2015:1628");
    
      script_name(english:"RHEL 5 : mysql55-mysql (RHSA-2015:1628)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated mysql55-mysql packages that fix several security issues are
    now available for Red Hat Enterprise Linux 5.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    MySQL is a multi-user, multi-threaded SQL database server. It consists
    of the MySQL server daemon (mysqld) and many client programs and
    libraries.
    
    This update fixes several vulnerabilities in the MySQL database
    server. Information about these flaws can be found on the Oracle
    Critical Patch Update Advisory pages, listed in the References
    section. (CVE-2014-6568, CVE-2015-0374, CVE-2015-0381, CVE-2015-0382,
    CVE-2015-0391, CVE-2015-0411, CVE-2015-0432, CVE-2015-0433,
    CVE-2015-0441, CVE-2015-0499, CVE-2015-0501, CVE-2015-0505,
    CVE-2015-2568, CVE-2015-2571, CVE-2015-2573, CVE-2015-2582,
    CVE-2015-2620, CVE-2015-2643, CVE-2015-2648, CVE-2015-4737,
    CVE-2015-4752, CVE-2015-4757)
    
    These updated packages upgrade MySQL to version 5.5.45. Refer to the
    MySQL Release Notes listed in the References section for a complete
    list of changes.
    
    All MySQL users should upgrade to these updated packages, which
    correct these issues. After installing this update, the MySQL server
    daemon (mysqld) will be restarted automatically."
      );
      # http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?df55894d"
      );
      # http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html#
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ef68d9ef"
      );
      # http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?73eb3b44"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2015:1628"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0374"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0411"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0382"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0391"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0432"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-6568"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0381"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0505"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-2571"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-2573"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0501"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-2582"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-4752"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-2620"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-2568"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0433"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-4757"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-4737"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-2648"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0499"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0441"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-2643"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-4816"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-4819"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-4864"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-4879"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mysql55-mysql");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-bench");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mysql55-mysql-test");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/08/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/17");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = eregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2015:1628";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"mysql55-mysql-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"mysql55-mysql-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"mysql55-mysql-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"mysql55-mysql-bench-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"mysql55-mysql-bench-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"mysql55-mysql-bench-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"mysql55-mysql-debuginfo-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"mysql55-mysql-devel-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"mysql55-mysql-libs-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"mysql55-mysql-libs-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"mysql55-mysql-libs-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"mysql55-mysql-server-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"mysql55-mysql-server-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"mysql55-mysql-server-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"mysql55-mysql-test-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"mysql55-mysql-test-5.5.45-1.el5")) flag++;
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"mysql55-mysql-test-5.5.45-1.el5")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mysql55-mysql / mysql55-mysql-bench / mysql55-mysql-debuginfo / etc");
      }
    }
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150824_MARIADB_ON_SL7_X.NASL
    descriptionIt was found that the MySQL client library permitted but did not require a client to use SSL/TLS when establishing a secure connection to a MySQL server using the
    last seen2020-03-18
    modified2015-08-25
    plugin id85622
    published2015-08-25
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85622
    titleScientific Linux Security Update : mariadb on SL7.x x86_64 (20150824) (BACKRONYM)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85622);
      script_version("2.11");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/25");
    
      script_cve_id("CVE-2015-0433", "CVE-2015-0441", "CVE-2015-0499", "CVE-2015-0501", "CVE-2015-0505", "CVE-2015-2568", "CVE-2015-2571", "CVE-2015-2573", "CVE-2015-2582", "CVE-2015-2620", "CVE-2015-2643", "CVE-2015-2648", "CVE-2015-3152", "CVE-2015-4737", "CVE-2015-4752", "CVE-2015-4757");
    
      script_name(english:"Scientific Linux Security Update : mariadb on SL7.x x86_64 (20150824) (BACKRONYM)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was found that the MySQL client library permitted but did not
    require a client to use SSL/TLS when establishing a secure connection
    to a MySQL server using the '--ssl' option. A man-in-the-middle
    attacker could use this flaw to strip the SSL/TLS protection from a
    connection between a client and a server. (CVE-2015-3152)
    
    (CVE-2015-0501, CVE-2015-2568, CVE-2015-0499, CVE-2015-2571,
    CVE-2015-0433, CVE-2015-0441, CVE-2015-0505, CVE-2015-2573,
    CVE-2015-2582, CVE-2015-2620, CVE-2015-2643, CVE-2015-2648,
    CVE-2015-4737, CVE-2015-4752, CVE-2015-4757)
    
    After installing this update, the MariaDB server daemon (mysqld) will
    be restarted automatically."
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1508&L=scientific-linux-errata&F=&S=&P=22767
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?2651149f"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:M/C:N/I:N/A:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb-bench");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb-embedded");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb-embedded-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mariadb-test");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/08/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/25");
      script_set_attribute(attribute:"in_the_news", value:"true");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 7.x", "Scientific Linux " + os_ver);
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-5.5.44-1.el7_1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-bench-5.5.44-1.el7_1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-debuginfo-5.5.44-1.el7_1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-devel-5.5.44-1.el7_1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-embedded-5.5.44-1.el7_1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-embedded-devel-5.5.44-1.el7_1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-libs-5.5.44-1.el7_1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-server-5.5.44-1.el7_1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mariadb-test-5.5.44-1.el7_1")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mariadb / mariadb-bench / mariadb-debuginfo / mariadb-devel / etc");
    }
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201610-06.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201610-06 (MySQL and MariaDB: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in MySQL and MariaDB. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could exploit vulnerabilities, through multiple vectors, that affect the confidentiality, integrity, and availability of MySQL and MariaDB. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id93993
    published2016-10-12
    reporterThis script is Copyright (C) 2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/93993
    titleGLSA-201610-06 : MySQL and MariaDB: Multiple vulnerabilities
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1665.NASL
    descriptionFrom Red Hat Security Advisory 2015:1665 : Updated mariadb packages that fix several security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. It was found that the MySQL client library permitted but did not require a client to use SSL/TLS when establishing a secure connection to a MySQL server using the
    last seen2020-06-01
    modified2020-06-02
    plugin id85612
    published2015-08-25
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85612
    titleOracle Linux 7 : mariadb (ELSA-2015-1665) (BACKRONYM)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150817_MYSQL55_MYSQL_ON_SL5_X.NASL
    descriptionThis update fixes several vulnerabilities in the MySQL database server. (CVE-2014-6568, CVE-2015-0374, CVE-2015-0381, CVE-2015-0382, CVE-2015-0391, CVE-2015-0411, CVE-2015-0432, CVE-2015-0433, CVE-2015-0441, CVE-2015-0499, CVE-2015-0501, CVE-2015-0505, CVE-2015-2568, CVE-2015-2571, CVE-2015-2573, CVE-2015-2582, CVE-2015-2620, CVE-2015-2643, CVE-2015-2648, CVE-2015-4737, CVE-2015-4752, CVE-2015-4757) After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen2020-03-18
    modified2015-08-18
    plugin id85499
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85499
    titleScientific Linux Security Update : mysql55-mysql on SL5.x i386/x86_64 (20150817)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1788-1.NASL
    descriptionMySQL was updated to version 5.5.45, fixing bugs and security issues. A list of all changes can be found on : - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html To fix the
    last seen2020-06-01
    modified2020-06-02
    plugin id86537
    published2015-10-22
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86537
    titleSUSE SLED11 / SLES11 Security Update : mysql (SUSE-SU-2015:1788-1) (BACKRONYM)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2674-1.NASL
    descriptionMultiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.44 in Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 14.10. Ubuntu 15.04 has been updated to MySQL 5.6.25. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-25.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.h tml. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id84915
    published2015-07-22
    reporterUbuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84915
    titleUbuntu 12.04 LTS / 14.04 LTS / 14.10 / 15.04 : mysql-5.5, mysql-5.6 vulnerabilities (USN-2674-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1628.NASL
    descriptionUpdated mysql55-mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pages, listed in the References section. (CVE-2014-6568, CVE-2015-0374, CVE-2015-0381, CVE-2015-0382, CVE-2015-0391, CVE-2015-0411, CVE-2015-0432, CVE-2015-0433, CVE-2015-0441, CVE-2015-0499, CVE-2015-0501, CVE-2015-0505, CVE-2015-2568, CVE-2015-2571, CVE-2015-2573, CVE-2015-2582, CVE-2015-2620, CVE-2015-2643, CVE-2015-2648, CVE-2015-4737, CVE-2015-4752, CVE-2015-4757) These updated packages upgrade MySQL to version 5.5.45. Refer to the MySQL Release Notes listed in the References section for a complete list of changes. All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85460
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85460
    titleCentOS 5 : mysql55-mysql (CESA-2015:1628)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1628.NASL
    descriptionFrom Red Hat Security Advisory 2015:1628 : Updated mysql55-mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pages, listed in the References section. (CVE-2014-6568, CVE-2015-0374, CVE-2015-0381, CVE-2015-0382, CVE-2015-0391, CVE-2015-0411, CVE-2015-0432, CVE-2015-0433, CVE-2015-0441, CVE-2015-0499, CVE-2015-0501, CVE-2015-0505, CVE-2015-2568, CVE-2015-2571, CVE-2015-2573, CVE-2015-2582, CVE-2015-2620, CVE-2015-2643, CVE-2015-2648, CVE-2015-4737, CVE-2015-4752, CVE-2015-4757) These updated packages upgrade MySQL to version 5.5.45. Refer to the MySQL Release Notes listed in the References section for a complete list of changes. All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85488
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85488
    titleOracle Linux 5 : mysql55-mysql (ELSA-2015-1628)
  • NASL familyDatabases
    NASL idMYSQL_5_6_24_RPM.NASL
    descriptionThe version of Oracle MySQL installed on the remote host is 5.6.x prior to 5.6.24. It is, therefore, affected by the following vulnerabilities : - Multiple information disclosure vulnerabilities exist in the following subcomponents which can be exploited by an authenticated, remote attacker to gain access to sensitive information : - Pluggable Auth (CVE-2015-4737) - Security:Privileges (CVE-2015-2620) - Multiple denial of service vulnerabilities exist in the following subcomponents which can be exploited by an authenticated, remote attacker : - DML (CVE-2015-4905) - InnoDB (CVE-2015-4866) - Optimizer (CVE-2015-4757)
    last seen2020-06-04
    modified2015-08-19
    plugin id85538
    published2015-08-19
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85538
    titleOracle MySQL 5.6.x < 5.6.24 Multiple Vulnerabilities (July 2015 CPU) (October 2015 CPU)
  • NASL familyDatabases
    NASL idMYSQL_5_5_43_RPM.NASL
    descriptionThe version of Oracle MySQL installed on the remote host is 5.5.x prior to 5.5.43. It is, therefore, affected by an unspecified flaw in the Optimizer subcomponent. An authenticated, remote attacker can exploit this to cause a denial of service condition.
    last seen2020-06-04
    modified2015-07-22
    plugin id84924
    published2015-07-22
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84924
    titleOracle MySQL 5.5.x < 5.5.43 Optimizer DoS (July 2015 CPU)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1665.NASL
    descriptionUpdated mariadb packages that fix several security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. It was found that the MySQL client library permitted but did not require a client to use SSL/TLS when establishing a secure connection to a MySQL server using the
    last seen2020-06-01
    modified2020-06-02
    plugin id85616
    published2015-08-25
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85616
    titleRHEL 7 : mariadb (RHSA-2015:1665) (BACKRONYM)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1665.NASL
    descriptionUpdated mariadb packages that fix several security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. It was found that the MySQL client library permitted but did not require a client to use SSL/TLS when establishing a secure connection to a MySQL server using the
    last seen2020-06-01
    modified2020-06-02
    plugin id85635
    published2015-08-26
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85635
    titleCentOS 7 : mariadb (CESA-2015:1665) (BACKRONYM)

Redhat

advisories
  • rhsa
    idRHSA-2015:1628
  • rhsa
    idRHSA-2015:1629
  • rhsa
    idRHSA-2015:1630
  • rhsa
    idRHSA-2015:1646
  • rhsa
    idRHSA-2015:1647
  • rhsa
    idRHSA-2015:1665
rpms
  • mysql55-mysql-0:5.5.45-1.el5
  • mysql55-mysql-bench-0:5.5.45-1.el5
  • mysql55-mysql-debuginfo-0:5.5.45-1.el5
  • mysql55-mysql-devel-0:5.5.45-1.el5
  • mysql55-mysql-libs-0:5.5.45-1.el5
  • mysql55-mysql-server-0:5.5.45-1.el5
  • mysql55-mysql-test-0:5.5.45-1.el5
  • mysql55-mysql-0:5.5.45-1.el6
  • mysql55-mysql-0:5.5.45-1.el7
  • mysql55-mysql-bench-0:5.5.45-1.el6
  • mysql55-mysql-bench-0:5.5.45-1.el7
  • mysql55-mysql-debuginfo-0:5.5.45-1.el6
  • mysql55-mysql-debuginfo-0:5.5.45-1.el7
  • mysql55-mysql-devel-0:5.5.45-1.el6
  • mysql55-mysql-devel-0:5.5.45-1.el7
  • mysql55-mysql-libs-0:5.5.45-1.el6
  • mysql55-mysql-libs-0:5.5.45-1.el7
  • mysql55-mysql-server-0:5.5.45-1.el6
  • mysql55-mysql-server-0:5.5.45-1.el7
  • mysql55-mysql-test-0:5.5.45-1.el6
  • mysql55-mysql-test-0:5.5.45-1.el7
  • rh-mysql56-mysql-0:5.6.26-1.el6
  • rh-mysql56-mysql-0:5.6.26-1.el7
  • rh-mysql56-mysql-bench-0:5.6.26-1.el6
  • rh-mysql56-mysql-bench-0:5.6.26-1.el7
  • rh-mysql56-mysql-common-0:5.6.26-1.el6
  • rh-mysql56-mysql-common-0:5.6.26-1.el7
  • rh-mysql56-mysql-config-0:5.6.26-1.el6
  • rh-mysql56-mysql-config-0:5.6.26-1.el7
  • rh-mysql56-mysql-debuginfo-0:5.6.26-1.el6
  • rh-mysql56-mysql-debuginfo-0:5.6.26-1.el7
  • rh-mysql56-mysql-devel-0:5.6.26-1.el6
  • rh-mysql56-mysql-devel-0:5.6.26-1.el7
  • rh-mysql56-mysql-errmsg-0:5.6.26-1.el6
  • rh-mysql56-mysql-errmsg-0:5.6.26-1.el7
  • rh-mysql56-mysql-server-0:5.6.26-1.el6
  • rh-mysql56-mysql-server-0:5.6.26-1.el7
  • rh-mysql56-mysql-test-0:5.6.26-1.el6
  • rh-mysql56-mysql-test-0:5.6.26-1.el7
  • rh-mariadb100-mariadb-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-bench-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-bench-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-common-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-common-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-config-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-config-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-debuginfo-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-debuginfo-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-devel-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-devel-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-errmsg-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-errmsg-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-oqgraph-engine-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-oqgraph-engine-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-server-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-server-1:10.0.20-1.el7
  • rh-mariadb100-mariadb-test-1:10.0.20-1.el6
  • rh-mariadb100-mariadb-test-1:10.0.20-1.el7
  • mariadb55-mariadb-0:5.5.44-1.el6
  • mariadb55-mariadb-0:5.5.44-1.el7
  • mariadb55-mariadb-bench-0:5.5.44-1.el6
  • mariadb55-mariadb-bench-0:5.5.44-1.el7
  • mariadb55-mariadb-debuginfo-0:5.5.44-1.el6
  • mariadb55-mariadb-debuginfo-0:5.5.44-1.el7
  • mariadb55-mariadb-devel-0:5.5.44-1.el6
  • mariadb55-mariadb-devel-0:5.5.44-1.el7
  • mariadb55-mariadb-libs-0:5.5.44-1.el6
  • mariadb55-mariadb-libs-0:5.5.44-1.el7
  • mariadb55-mariadb-server-0:5.5.44-1.el6
  • mariadb55-mariadb-server-0:5.5.44-1.el7
  • mariadb55-mariadb-test-0:5.5.44-1.el6
  • mariadb55-mariadb-test-0:5.5.44-1.el7
  • mariadb-1:5.5.44-1.ael7b_1
  • mariadb-1:5.5.44-1.el7_1
  • mariadb-bench-1:5.5.44-1.ael7b_1
  • mariadb-bench-1:5.5.44-1.el7_1
  • mariadb-debuginfo-1:5.5.44-1.ael7b_1
  • mariadb-debuginfo-1:5.5.44-1.el7_1
  • mariadb-devel-1:5.5.44-1.ael7b_1
  • mariadb-devel-1:5.5.44-1.el7_1
  • mariadb-embedded-1:5.5.44-1.ael7b_1
  • mariadb-embedded-1:5.5.44-1.el7_1
  • mariadb-embedded-devel-1:5.5.44-1.ael7b_1
  • mariadb-embedded-devel-1:5.5.44-1.el7_1
  • mariadb-libs-1:5.5.44-1.ael7b_1
  • mariadb-libs-1:5.5.44-1.el7_1
  • mariadb-server-1:5.5.44-1.ael7b_1
  • mariadb-server-1:5.5.44-1.el7_1
  • mariadb-test-1:5.5.44-1.ael7b_1
  • mariadb-test-1:5.5.44-1.el7_1