[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2019:1258-01 -- Redhat rh-mariadb102-galera, rh-mariadb102-mariadb

ID: oval:org.secpod.oval:def:505027Date: (C)2021-01-29   (M)2022-12-12
Class: PATCHFamily: unix




MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. The following packages have been upgraded to a later upstream version: rh-mariadb102-mariadb , rh-mariadb102-galera . Security Fix: * mysql: Server: Replication unspecified vulnerability * mysql: Server: Optimizer unspecified vulnerability * mariadb: Replication in sql/event_data_objects.cc occurs before ACL checks * mysql: Server: Partition unspecified vulnerability * mysql: InnoDB unspecified vulnerability * mysql: Server: DDL unspecified vulnerability * mysql: Server: Optimizer multiple unspecified vulnerabilities * mysql: Server: Replication unspecified vulnerability * mysql: InnoDB multiple unspecified vulnerabilities * mysql: Client programs unspecified vulnerability * mysql: Server: Locking unspecified vulnerability * mysql: Server: Optimizer unspecified vulnerability * mysql: Server: DDL multiple unspecified vulnerabilities * mysql: MyISAM unspecified vulnerability * mysql: InnoDB multiple unspecified vulnerabilities * mysql: Server: Security: Privileges unspecified vulnerability * mysql: Client programs unspecified vulnerability * mysql: Server: Parser unspecified vulnerability * mysql: InnoDB multiple unspecified vulnerabilities * mysql: Server: Storage Engines unspecified vulnerability * mysql: Server: Parser unspecified vulnerability * mysql: Server: Connection Handling unspecified vulnerability * mysql: InnoDB unspecified vulnerability * mysql: Server: DDL unspecified vulnerability * mysql: Server: Options unspecified vulnerability * mysql: Init script calling kill with root privileges using pid from pidfile owned by mysql user For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * SELinux blocks working in /tmp directory for wsrep_recover_position function * mysql faces a bug which prevents bacula from functioning * GSSAPI module build fix - backport request * Deadlock in RNG initialization in the FIPS mode on some circumstances * Use appropriate version of Galera * Encountered WSREP: BF lock wait long for trx MariaDB 10.2.8

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Product:
rh-mariadb102-galera
rh-mariadb102-mariadb
Reference:
RHSA-2019:1258-01
CVE-2017-10268
CVE-2017-10378
CVE-2017-15365
CVE-2018-2562
CVE-2018-2612
CVE-2018-2622
CVE-2018-2640
CVE-2018-2665
CVE-2018-2668
CVE-2018-2755
CVE-2018-2759
CVE-2018-2761
CVE-2018-2766
CVE-2018-2771
CVE-2018-2777
CVE-2018-2781
CVE-2018-2782
CVE-2018-2784
CVE-2018-2786
CVE-2018-2787
CVE-2018-2810
CVE-2018-2813
CVE-2018-2817
CVE-2018-2819
CVE-2018-3058
CVE-2018-3060
CVE-2018-3063
CVE-2018-3064
CVE-2018-3066
CVE-2018-3081
CVE-2018-3133
CVE-2018-3143
CVE-2018-3156
CVE-2018-3162
CVE-2018-3173
CVE-2018-3174
CVE-2018-3185
CVE-2018-3200
CVE-2018-3251
CVE-2018-3277
CVE-2018-3282
CVE-2018-3284
CVE-2019-2455
CVE-2019-2503
CVE-2019-2510
CVE-2019-2537
CVE-2020-14550
CVE    47
CVE-2017-10378
CVE-2017-15365
CVE-2020-14550
CVE-2018-2562
...
CPE    4
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
cpe:/a:redhat:rh-mariadb102-galera
cpe:/a:redhat:rh-mariadb102-mariadb
...

© SecPod Technologies