[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2018:0574-01 -- Redhat rh-mariadb101-galera, rh-mariadb101-mariadb

ID: oval:org.secpod.oval:def:505090Date: (C)2021-01-29   (M)2023-02-01
Class: PATCHFamily: unix




MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. The following packages have been upgraded to a later upstream version: rh-mariadb101-mariadb . Security Fix: * mysql: insecure error log file handling in mysqld_safe * mysql: Server: Optimizer unspecified vulnerability * mysql: Server: Charsets unspecified vulnerability * mysql: Server: DML unspecified vulnerability * mysql: Server: InnoDB unspecified vulnerability * mysql: Server: DDL unspecified vulnerability * mysql: unsafe chmod/chown use in init script * mysql: unrestricted mysqld_safe"s ledir * mysql: Server: DML unspecified vulnerability * mysql: Server: Optimizer unspecified vulnerability * mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix * mysql: Server: MyISAM unspecified vulnerability * mysql: Logging unspecified vulnerability * mysql: Server: Error Handling unspecified vulnerability * mysql: Server: Optimizer unspecified vulnerability * mysql: Server: DML unspecified vulnerability * mysql: Server: DDL unspecified vulnerability * mysql: Client programs unspecified vulnerability * mysql: Server: DML unspecified vulnerability * mysql: Server: Replication unspecified vulnerability * mysql: Server: InnoDB unspecified vulnerability * mysql: Server: Optimizer unspecified vulnerability * mysql: Client programs unspecified vulnerability * mysql: Server: DDL unspecified vulnerability * mysql: prepared statement handle use-after-free after disconnect * mysql: Server: DDL unspecified vulnerability For more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section. Bug Fix: * Previously, a syntax error in the Galera Arbitrator SysV init script prevented the garbd daemon from being started when the SysV init script was used. With this update, the definition of the main daemon binary in the SysV init script has been fixed, and the described problem no longer occurs. * Prior to this update, the scl macros were not set for the rh-mariadb101-mariadb service file, which consequently made the service file unusable. This bug has been fixed, and rh-mariadb101-mariadb service now works as expected

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Product:
rh-mariadb101-galera
rh-mariadb101-mariadb
Reference:
RHSA-2018:0574-01
CVE-2016-6664
CVE-2017-3238
CVE-2017-3243
CVE-2017-3244
CVE-2017-3257
CVE-2017-3258
CVE-2017-3265
CVE-2017-3291
CVE-2017-3302
CVE-2017-3308
CVE-2017-3309
CVE-2017-3312
CVE-2017-3313
CVE-2017-3317
CVE-2017-3318
CVE-2017-3453
CVE-2017-3456
CVE-2017-3464
CVE-2017-3636
CVE-2017-3641
CVE-2017-3653
CVE-2017-10268
CVE-2017-10286
CVE-2017-10378
CVE-2017-10379
CVE-2017-10384
CVE    26
CVE-2016-6664
CVE-2017-10378
CVE-2017-3302
CVE-2017-3244
...
CPE    4
cpe:/a:redhat:rh-mariadb101-galera
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
cpe:/a:redhat:rh-mariadb101-mariadb
...

© SecPod Technologies