RHSA-2019:1258-01 -- Redhat rh-mariadb102-galera, rh-mariadb102-mariadbID: oval:org.secpod.oval:def:505027 | Date: (C)2021-01-29 (M)2022-12-12 |
Class: PATCH | Family: unix |
MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. The following packages have been upgraded to a later upstream version: rh-mariadb102-mariadb , rh-mariadb102-galera . Security Fix: * mysql: Server: Replication unspecified vulnerability * mysql: Server: Optimizer unspecified vulnerability * mariadb: Replication in sql/event_data_objects.cc occurs before ACL checks * mysql: Server: Partition unspecified vulnerability * mysql: InnoDB unspecified vulnerability * mysql: Server: DDL unspecified vulnerability * mysql: Server: Optimizer multiple unspecified vulnerabilities * mysql: Server: Replication unspecified vulnerability * mysql: InnoDB multiple unspecified vulnerabilities * mysql: Client programs unspecified vulnerability * mysql: Server: Locking unspecified vulnerability * mysql: Server: Optimizer unspecified vulnerability * mysql: Server: DDL multiple unspecified vulnerabilities * mysql: MyISAM unspecified vulnerability * mysql: InnoDB multiple unspecified vulnerabilities * mysql: Server: Security: Privileges unspecified vulnerability * mysql: Client programs unspecified vulnerability * mysql: Server: Parser unspecified vulnerability * mysql: InnoDB multiple unspecified vulnerabilities * mysql: Server: Storage Engines unspecified vulnerability * mysql: Server: Parser unspecified vulnerability * mysql: Server: Connection Handling unspecified vulnerability * mysql: InnoDB unspecified vulnerability * mysql: Server: DDL unspecified vulnerability * mysql: Server: Options unspecified vulnerability * mysql: Init script calling kill with root privileges using pid from pidfile owned by mysql user For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * SELinux blocks working in /tmp directory for wsrep_recover_position function * mysql faces a bug which prevents bacula from functioning * GSSAPI module build fix - backport request * Deadlock in RNG initialization in the FIPS mode on some circumstances * Use appropriate version of Galera * Encountered WSREP: BF lock wait long for trx MariaDB 10.2.8
Platform: |
Red Hat Enterprise Linux 7 |
Red Hat Enterprise Linux 6 |
Product: |
rh-mariadb102-galera |
rh-mariadb102-mariadb |