Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:GA
patchinfo.730
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.730
<patchinfo incident="730"> <packager>kstreitova</packager> <issue tracker="bnc" id="936408">10.0.18 and 10.0.19 security update</issue> <issue tracker="bnc" id="919053">server crashes when inserting more rows than available space on disk</issue> <issue tracker="bnc" id="934789">Logjam Attack: mysql uses 512 bit dh groups in SSL</issue> <issue tracker="bnc" id="919062">InnoDB: Failing assertion: lock->lock_word == X_LOCK_DECR</issue> <issue tracker="bnc" id="924663"> CVE-2015-3152:mysql --ssl does not enforce SSL (oCERT-2015-003 BACKRONYM)</issue> <issue tracker="bnc" id="936409"> 10.0.17 security update</issue> <issue tracker="bnc" id="920865">ssl in fips mode can not connect with --ssl-cipher=DHE-RSA-AES256-SHA - handshake failure</issue> <issue tracker="bnc" id="920896">mysql-test in fips mode ssl tests with cipher failure</issue> <issue tracker="bnc" id="921333">mysql-test - SUITE:percona - percona.innodb_sys_index 'xtradb' failure - @@version_comment</issue> <issue tracker="bnc" id="936407">CVE-2015-3152: 10.0.20 update</issue> <issue tracker="cve" id="CVE-2015-0505"></issue> <issue tracker="cve" id="CVE-2015-2571"></issue> <issue tracker="cve" id="CVE-2015-2573"></issue> <issue tracker="cve" id="CVE-2015-0501"></issue> <issue tracker="cve" id="CVE-2015-2568"></issue> <issue tracker="cve" id="CVE-2015-0433"></issue> <issue tracker="cve" id="CVE-2015-3152"></issue> <issue tracker="cve" id="CVE-2015-2325"></issue> <issue tracker="cve" id="CVE-2015-0499"></issue> <issue tracker="cve" id="CVE-2015-2326"></issue> <issue tracker="cve" id="CVE-2015-0441"></issue> <issue tracker="cve" id="CVE-2014-8964"></issue> <issue tracker="bnc" id="906574">VUL-1: CVE-2014-8964: pcre: heap buffer overflow</issue> <issue tracker="bnc" id="924960">VUL-0: CVE-2015-2325: pcre: heap buffer overflow in compile_branch()</issue> <issue tracker="bnc" id="924961">VUL-0: CVE-2015-2326: pcre: heap buffer overflow in pcre_compile2()</issue> <category>security</category> <rating>important</rating> <summary>Security update for mariadb</summary> <description> This update fixes the following security issues: * Logjam attack: mysql uses 512 bit dh groups in SSL [bnc#934789] * CVE-2015-3152: mysql --ssl does not enforce SSL [bnc#924663] * CVE-2014-8964: heap buffer overflow [bnc#906574] * CVE-2015-2325: heap buffer overflow in compile_branch() [bnc#924960] * CVE-2015-2326: heap buffer overflow in pcre_compile2() [bnc#924961] * CVE-2015-0501: unspecified vulnerability related to Server:Compiling (CPU April 2015) * CVE-2015-2571: unspecified vulnerability related to Server:Optimizer (CPU April 2015) * CVE-2015-0505: unspecified vulnerability related to Server:DDL (CPU April 2015) * CVE-2015-0499: unspecified vulnerability related to Server:Federated (CPU April 2015) * CVE-2015-2568: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) * CVE-2015-2573: unspecified vulnerability related to Server:DDL (CPU April 2015) * CVE-2015-0433: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) * CVE-2015-0441: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor