安全公告详情

NS-SA-2025-0114

2025-07-25 16:49:52

简介

moderate: mariadb/ansible-core security update

严重级别

moderate

主题

An update for mariadb/ansible-core is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

mariadb:
ansible-core:


Security Fix(es):
mariadb: A flaw was found in MariaDB Server. This vulnerability may allow an attacker to cause a denial of service via improper handling of derived tables, where fix_fields_if_needed is called under mysql_derived_prepare before the derived table is prepared.(CVE-2023-52968)
mariadb: A flaw was found in MariaDB Server. This vulnerability may allow an attacker to cause a crash via an issue related to make_aggr_tables_info and optimize_stage2, resulting in an empty backtrace log.(CVE-2023-52969)
mariadb: A flaw was found in MariaDB Server. This vulnerability may allow an attacker to crash the database via Item_direct_view_ref::derived_field_transformer_for_where.(CVE-2023-52970)
mariadb: A flaw was found in the MySQL Server component: InnoDB. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs, via multiple network protocols.(CVE-2025-21490)
mariadb: bugfix
ansible-core: An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.(CVE-2024-0690)
ansible-core: A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks.(CVE-2024-11079)
ansible-core: A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.(CVE-2024-8775)
ansible-core: A flaw was found in Ansible. The ansible-core user module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the user module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.(CVE-2024-9902)
ansible-core: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.03B8.

影响组件

  • mariadb
  • ansible-core

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["mariadb-gssapi-server-10.6.22-1.zncgsl7.1.x86_64.rpm","mariadb-server-utils-10.6.22-1.zncgsl7.1.x86_64.rpm","mariadb-errmsg-10.6.22-1.zncgsl7.1.x86_64.rpm","mariadb-10.6.22-1.zncgsl7.1.x86_64.rpm","mariadb-common-10.6.22-1.zncgsl7.1.x86_64.rpm","mariadb-backup-10.6.22-1.zncgsl7.1.x86_64.rpm","mariadb-server-10.6.22-1.zncgsl7.1.x86_64.rpm"],"source":"mariadb-10.6.22-1.zncgsl7.1.src.rpm"},{"binary":["ansible-core-2.16.3-2.0.1.zncgsl7.12.x86_64.rpm"],"source":"ansible-core-2.16.3-2.0.1.zncgsl7.12.src.rpm"}]}]}

CVE

参考