Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:Update
patchinfo.4073
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4073
<patchinfo incident="4073"> <issue id="1022428" tracker="bnc">VUL-0: mariadb: Use after free in libmysqlclient.so</issue> <issue id="1020875" tracker="bnc">VUL-0: CVE-2017-3258: mariadb,mysql: unspecified vulnerability in the DDL component (CPU Jan 2017)</issue> <issue id="1020877" tracker="bnc">VUL-0: CVE-2017-3244: mariadb,mysql: unspecified vulnerability affecing the DML component (CPU Jan 2017)</issue> <issue id="1020873" tracker="bnc">VUL-0: CVE-2017-3312: mariadb,mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664</issue> <issue id="1008253" tracker="bnc">VUL-0: CVE-2016-6664: mariadb,mysql: Root Privilege Escalation</issue> <issue id="1020885" tracker="bnc">VUL-0: CVE-2017-3265: mariadb,mysql: unsafe chmod/chown use in init script (CPU Jan 2017)</issue> <issue id="1020894" tracker="bnc">VUL-0: CVE-2017-3317: mariadb,mysql: unspecified vulnerability affecting Logging (CPU Jan 2017)</issue> <issue id="1020878" tracker="bnc">VUL-0: CVE-2017-3257 mariadb,mysql: unspecified vulnerability affecting InnoDB (CPU Jan 2017)</issue> <issue id="1020882" tracker="bnc">VUL-0: CVE-2017-3238: mariadb,mysql: unspecified vulnerability affecting the Optimizer component (CPU Jan 2017)</issue> <issue id="1020884" tracker="bnc">VUL-0: CVE-2017-3291: mariadb,mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017)</issue> <issue id="1020891" tracker="bnc">VUL-0: CVE-2017-3243: mariadb,mysql: unspecified vulnerability affecting the Charsets component (CPU Jan 2017)</issue> <issue id="1020896" tracker="bnc">VUL-0: CVE-2017-3318: mariadb,mysql: unspecified vulnerability affecting Error Handling (CPU Jan 2017)</issue> <issue id="1020868" tracker="bnc">VUL-0: [TRACKERBUG] mysql,mariadb: Oracle Critical Patch Update Jan 2017</issue> <issue id="2017-3291" tracker="cve" /> <issue id="2017-3317" tracker="cve" /> <issue id="2017-3265" tracker="cve" /> <issue id="2017-3244" tracker="cve" /> <issue id="2016-6664" tracker="cve" /> <issue id="2017-3243" tracker="cve" /> <issue id="2017-3318" tracker="cve" /> <issue id="2017-3238" tracker="cve" /> <issue id="2017-3312" tracker="cve" /> <issue id="2017-3258" tracker="cve" /> <issue id="2017-3257" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>kstreitova</packager> <description> This mariadb version update to 10.0.29 fixes the following issues: - CVE-2017-3318: unspecified vulnerability affecting Error Handling (bsc#1020896) - CVE-2017-3317: unspecified vulnerability affecting Logging (bsc#1020894) - CVE-2017-3312: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873) - CVE-2017-3291: unrestricted mysqld_safe's ledir (bsc#1020884) - CVE-2017-3265: unsafe chmod/chown use in init script (bsc#1020885) - CVE-2017-3258: unspecified vulnerability in the DDL component (bsc#1020875) - CVE-2017-3257: unspecified vulnerability affecting InnoDB (bsc#1020878) - CVE-2017-3244: unspecified vulnerability affecing the DML component (bsc#1020877) - CVE-2017-3243: unspecified vulnerability affecting the Charsets component (bsc#1020891) - CVE-2017-3238: unspecified vulnerability affecting the Optimizer component (bsc#1020882) - CVE-2016-6664: Root Privilege Escalation (bsc#1008253) - Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428) - notable changes: * XtraDB updated to 5.6.34-79.1 * TokuDB updated to 5.6.34-79.1 * Innodb updated to 5.6.35 * Performance Schema updated to 5.6.35 Release notes and changelog: * https://kb.askmonty.org/en/mariadb-10029-release-notes * https://kb.askmonty.org/en/mariadb-10029-changelog </description> <summary>Security update for mariadb</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor