File _patchinfo of Package patchinfo.29321

<patchinfo incident="29321">
  <issue tracker="jsc" id="SLE-8269"/>
  <issue tracker="jsc" id="SLE-12253"/>
  <issue tracker="jsc" id="PED-2455"/>
  <issue tracker="cve" id="2018-2668"/>
  <issue tracker="cve" id="2021-46658"/>
  <issue tracker="cve" id="2016-0606"/>
  <issue tracker="cve" id="2019-2628"/>
  <issue tracker="cve" id="2018-3060"/>
  <issue tracker="cve" id="2016-5629"/>
  <issue tracker="cve" id="2018-2767"/>
  <issue tracker="cve" id="2018-2810"/>
  <issue tracker="cve" id="2017-10379"/>
  <issue tracker="cve" id="2015-4836"/>
  <issue tracker="cve" id="2022-32088"/>
  <issue tracker="cve" id="2016-0598"/>
  <issue tracker="cve" id="2012-5612"/>
  <issue tracker="cve" id="2012-4414"/>
  <issue tracker="cve" id="2017-3265"/>
  <issue tracker="cve" id="2017-3464"/>
  <issue tracker="cve" id="2017-3317"/>
  <issue tracker="cve" id="2020-14776"/>
  <issue tracker="cve" id="2017-3244"/>
  <issue tracker="cve" id="2017-15365"/>
  <issue tracker="cve" id="2022-47015"/>
  <issue tracker="cve" id="2009-4030"/>
  <issue tracker="cve" id="2020-2574"/>
  <issue tracker="cve" id="2017-3238"/>
  <issue tracker="cve" id="2015-4864"/>
  <issue tracker="cve" id="2021-2372"/>
  <issue tracker="cve" id="2019-2537"/>
  <issue tracker="cve" id="2017-3291"/>
  <issue tracker="cve" id="2022-27384"/>
  <issue tracker="cve" id="2018-2612"/>
  <issue tracker="cve" id="2018-2640"/>
  <issue tracker="cve" id="2021-46659"/>
  <issue tracker="cve" id="2018-3200"/>
  <issue tracker="cve" id="2018-2771"/>
  <issue tracker="cve" id="2021-46669"/>
  <issue tracker="cve" id="2018-2787"/>
  <issue tracker="cve" id="2018-2766"/>
  <issue tracker="cve" id="2019-2938"/>
  <issue tracker="cve" id="2018-2622"/>
  <issue tracker="cve" id="2015-4815"/>
  <issue tracker="cve" id="2020-2752"/>
  <issue tracker="cve" id="2019-2740"/>
  <issue tracker="cve" id="2022-27452"/>
  <issue tracker="cve" id="2022-32085"/>
  <issue tracker="cve" id="2017-3312"/>
  <issue tracker="cve" id="2015-4895"/>
  <issue tracker="cve" id="2015-4816"/>
  <issue tracker="cve" id="2020-13249"/>
  <issue tracker="cve" id="2022-27387"/>
  <issue tracker="cve" id="2018-2665"/>
  <issue tracker="cve" id="2012-5615"/>
  <issue tracker="cve" id="2016-0668"/>
  <issue tracker="cve" id="2019-2627"/>
  <issue tracker="cve" id="2018-2784"/>
  <issue tracker="cve" id="2019-2737"/>
  <issue tracker="cve" id="2017-10384"/>
  <issue tracker="cve" id="2016-7440"/>
  <issue tracker="cve" id="2017-3636"/>
  <issue tracker="cve" id="2017-10320"/>
  <issue tracker="cve" id="2021-46665"/>
  <issue tracker="cve" id="2013-1976"/>
  <issue tracker="cve" id="2016-0651"/>
  <issue tracker="cve" id="2022-27381"/>
  <issue tracker="cve" id="2006-0903"/>
  <issue tracker="cve" id="2016-6662"/>
  <issue tracker="cve" id="2021-2389"/>
  <issue tracker="cve" id="2018-3064"/>
  <issue tracker="cve" id="2022-27444"/>
  <issue tracker="cve" id="2022-27455"/>
  <issue tracker="cve" id="2016-5440"/>
  <issue tracker="cve" id="2016-5616"/>
  <issue tracker="cve" id="2012-5611"/>
  <issue tracker="cve" id="2018-2759"/>
  <issue tracker="cve" id="2022-27382"/>
  <issue tracker="cve" id="2018-3282"/>
  <issue tracker="cve" id="2018-3162"/>
  <issue tracker="cve" id="2022-32081"/>
  <issue tracker="cve" id="2019-2758"/>
  <issue tracker="cve" id="2016-0505"/>
  <issue tracker="cve" id="2015-4913"/>
  <issue tracker="cve" id="2017-3258"/>
  <issue tracker="cve" id="2017-3308"/>
  <issue tracker="cve" id="2022-27448"/>
  <issue tracker="cve" id="2016-5626"/>
  <issue tracker="cve" id="2008-7247"/>
  <issue tracker="cve" id="2022-32084"/>
  <issue tracker="cve" id="2018-2782"/>
  <issue tracker="cve" id="2016-3477"/>
  <issue tracker="cve" id="2016-0597"/>
  <issue tracker="cve" id="2016-3492"/>
  <issue tracker="cve" id="2016-9843"/>
  <issue tracker="cve" id="2019-18901"/>
  <issue tracker="cve" id="2017-3318"/>
  <issue tracker="cve" id="2022-24050"/>
  <issue tracker="cve" id="2016-0616"/>
  <issue tracker="cve" id="2021-35604"/>
  <issue tracker="cve" id="2015-4858"/>
  <issue tracker="cve" id="2019-2974"/>
  <issue tracker="cve" id="2016-6664"/>
  <issue tracker="cve" id="2022-27377"/>
  <issue tracker="cve" id="2016-3521"/>
  <issue tracker="cve" id="2016-2047"/>
  <issue tracker="cve" id="2022-27446"/>
  <issue tracker="cve" id="2018-3284"/>
  <issue tracker="cve" id="2022-24052"/>
  <issue tracker="cve" id="2016-3615"/>
  <issue tracker="cve" id="2020-14765"/>
  <issue tracker="cve" id="2022-27447"/>
  <issue tracker="cve" id="2022-27457"/>
  <issue tracker="cve" id="2017-3243"/>
  <issue tracker="cve" id="2017-3257"/>
  <issue tracker="cve" id="2015-4861"/>
  <issue tracker="cve" id="2022-27451"/>
  <issue tracker="cve" id="2019-2614"/>
  <issue tracker="cve" id="2015-4819"/>
  <issue tracker="cve" id="2022-27386"/>
  <issue tracker="cve" id="2018-3173"/>
  <issue tracker="cve" id="2009-4028"/>
  <issue tracker="cve" id="2007-6303"/>
  <issue tracker="cve" id="2022-27378"/>
  <issue tracker="cve" id="2018-3185"/>
  <issue tracker="cve" id="2020-15180"/>
  <issue tracker="cve" id="2018-3058"/>
  <issue tracker="cve" id="2018-3277"/>
  <issue tracker="cve" id="2009-4019"/>
  <issue tracker="cve" id="2017-3313"/>
  <issue tracker="cve" id="2006-4227"/>
  <issue tracker="cve" id="2022-27456"/>
  <issue tracker="cve" id="2022-27379"/>
  <issue tracker="cve" id="2018-3143"/>
  <issue tracker="cve" id="2018-2819"/>
  <issue tracker="cve" id="2022-27449"/>
  <issue tracker="cve" id="2017-10268"/>
  <issue tracker="cve" id="2016-5624"/>
  <issue tracker="cve" id="2018-3063"/>
  <issue tracker="cve" id="2015-4866"/>
  <issue tracker="cve" id="2016-0640"/>
  <issue tracker="cve" id="2012-5627"/>
  <issue tracker="cve" id="2022-27445"/>
  <issue tracker="cve" id="2017-3309"/>
  <issue tracker="cve" id="2018-2777"/>
  <issue tracker="cve" id="2017-3653"/>
  <issue tracker="cve" id="2016-0649"/>
  <issue tracker="cve" id="2022-27458"/>
  <issue tracker="cve" id="2016-0646"/>
  <issue tracker="cve" id="2022-24048"/>
  <issue tracker="cve" id="2015-4802"/>
  <issue tracker="cve" id="2016-0610"/>
  <issue tracker="cve" id="2018-2813"/>
  <issue tracker="cve" id="2018-2761"/>
  <issue tracker="cve" id="2018-3066"/>
  <issue tracker="cve" id="2018-2817"/>
  <issue tracker="cve" id="2015-4807"/>
  <issue tracker="cve" id="2007-5969"/>
  <issue tracker="cve" id="2015-4826"/>
  <issue tracker="cve" id="2018-3156"/>
  <issue tracker="cve" id="2017-10378"/>
  <issue tracker="cve" id="2022-32091"/>
  <issue tracker="cve" id="2020-2814"/>
  <issue tracker="cve" id="2016-0596"/>
  <issue tracker="cve" id="2016-0650"/>
  <issue tracker="cve" id="2016-0642"/>
  <issue tracker="cve" id="2016-0644"/>
  <issue tracker="cve" id="2018-2781"/>
  <issue tracker="cve" id="2021-2154"/>
  <issue tracker="cve" id="2022-21427"/>
  <issue tracker="cve" id="2018-3251"/>
  <issue tracker="cve" id="2018-2562"/>
  <issue tracker="cve" id="2015-7744"/>
  <issue tracker="cve" id="2015-4830"/>
  <issue tracker="cve" id="2006-4226"/>
  <issue tracker="cve" id="2022-32089"/>
  <issue tracker="cve" id="2022-32083"/>
  <issue tracker="cve" id="2021-46663"/>
  <issue tracker="cve" id="2016-0600"/>
  <issue tracker="cve" id="2022-38791"/>
  <issue tracker="cve" id="2016-0608"/>
  <issue tracker="cve" id="2016-8283"/>
  <issue tracker="cve" id="2018-2786"/>
  <issue tracker="cve" id="2021-46661"/>
  <issue tracker="cve" id="2022-24051"/>
  <issue tracker="cve" id="2017-3456"/>
  <issue tracker="cve" id="2021-46664"/>
  <issue tracker="cve" id="2015-5969"/>
  <issue tracker="cve" id="2017-10365"/>
  <issue tracker="cve" id="2016-0641"/>
  <issue tracker="cve" id="2016-0546"/>
  <issue tracker="cve" id="2008-2079"/>
  <issue tracker="cve" id="2015-4879"/>
  <issue tracker="cve" id="2019-2510"/>
  <issue tracker="cve" id="2022-32086"/>
  <issue tracker="cve" id="2015-4870"/>
  <issue tracker="cve" id="2007-5970"/>
  <issue tracker="cve" id="2016-5584"/>
  <issue tracker="cve" id="2022-27376"/>
  <issue tracker="cve" id="2020-7221"/>
  <issue tracker="cve" id="2020-14789"/>
  <issue tracker="cve" id="2022-21595"/>
  <issue tracker="cve" id="2019-2739"/>
  <issue tracker="cve" id="2018-3174"/>
  <issue tracker="cve" id="2016-0609"/>
  <issue tracker="cve" id="2007-6304"/>
  <issue tracker="cve" id="2015-4792"/>
  <issue tracker="cve" id="2020-2812"/>
  <issue tracker="cve" id="2022-27383"/>
  <issue tracker="cve" id="2021-2166"/>
  <issue tracker="cve" id="2022-27380"/>
  <issue tracker="cve" id="2018-2755"/>
  <issue tracker="cve" id="2021-46668"/>
  <issue tracker="cve" id="2020-2760"/>
  <issue tracker="cve" id="2017-3641"/>
  <issue tracker="cve" id="2016-6663"/>
  <issue tracker="cve" id="2017-3302"/>
  <issue tracker="cve" id="2018-25032"/>
  <issue tracker="cve" id="2021-46657"/>
  <issue tracker="cve" id="2021-27928"/>
  <issue tracker="cve" id="2017-3453"/>
  <issue tracker="cve" id="2020-14812"/>
  <issue tracker="cve" id="2022-32087"/>
  <issue tracker="cve" id="2017-10286"/>
  <issue tracker="cve" id="2019-2805"/>
  <issue tracker="bnc" id="1198640">VUL-0: CVE-2022-27452: mariadb,mariadb-100: MariaDB: a segmentation fault in sql/item_cmpfunc.cc</issue>
  <issue tracker="bnc" id="859345">mysql crash with alternative cnf files (my-huge.cnf, my-large.cnf ...)</issue>
  <issue tracker="bnc" id="1198638">VUL-0: CVE-2022-27455: mariadb,mariadb-100: MariaDB: Use-After-Free in strings/ctype-simple.c</issue>
  <issue tracker="bnc" id="763150">Last update of mysql broke logrotate</issue>
  <issue tracker="bnc" id="1005581">VUL-0: CVE-2016-7440: mysql: Unspecified vulnerability in subcomponent Encryption</issue>
  <issue tracker="bnc" id="1069401">Database failed apply with mariadb 10.2 : RuntimeError: Galera cluster did not start after 600 seconds</issue>
  <issue tracker="bnc" id="894479">Mariadb url point to a strange website</issue>
  <issue tracker="bnc" id="1197459">VUL-0: CVE-2018-25032: zlib: memory corruption on deflate (i.e. compress)</issue>
  <issue tracker="bnc" id="1092544">GCC 8: mariadb test fails</issue>
  <issue tracker="bnc" id="1182218">mariadb: %_rpmmacrodir is owned by mariadb</issue>
  <issue tracker="bnc" id="1111859">Maria DB testsuite - test main.plugin_auth failed</issue>
  <issue tracker="bnc" id="1160868">VUL-0: CVE-2020-7221: mariadb: auth_pam_tool runtime permission setting allows privilege escalation from mysql user to root</issue>
  <issue tracker="bnc" id="1201169">VUL-0: CVE-2022-32089: mariadb: segmentation fault via the component st_select_lex_unit:exclude_level</issue>
  <issue tracker="bnc" id="1005562">VUL-0: CVE-2016-5616: mysql: Unspecified vulnerability in subcomponent MyISAM</issue>
  <issue tracker="bnc" id="990890">mariadb - @sysconfdir@ variable is not expanded properly</issue>
  <issue tracker="bnc" id="1042632">Mariadb fails to build with openssl-1.1</issue>
  <issue tracker="bnc" id="1183770">VUL-0: CVE-2021-27928: mariadb: A remote code execution issue was discovered</issue>
  <issue tracker="bnc" id="1198639">VUL-0: CVE-2022-27451: mariadb,mariadb-100: segmentation fault in sql/field_conv.cc</issue>
  <issue tracker="bnc" id="1198634">VUL-0: CVE-2022-27444: mariadb-100,mariadb: Segmentation Fault in sql/item_subselect.cc</issue>
  <issue tracker="bnc" id="1112397">VUL-0: CVE-2018-3251: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="1088681">VUL-0: CVE-2018-2767: mariadb,mysql: Use of SSL/TLS not enforced in embedded server library (Return of BACKRONYM)</issue>
  <issue tracker="bnc" id="1047218">trackerbug: packages do not build reproducibly from including build time</issue>
  <issue tracker="bnc" id="1080891">server:database/mariadb: up-streaming patches</issue>
  <issue tracker="bnc" id="942908">systemd-tmpfiles: Two or more conflicting lines for /var/tmp/mysql.* configured, ignoring.</issue>
  <issue tracker="bnc" id="1068906">MariaDB: ALTER TABLE can't rename columns with CHECK constraints</issue>
  <issue tracker="bnc" id="332530">MySQL fails to reload after security update error from YOU</issue>
  <issue tracker="bnc" id="1198632">VUL-0: CVE-2022-27448: mariadb-100,mariadb: Assertation Failure in row/row0mysql.cc</issue>
  <issue tracker="bnc" id="1058729">MariaDB - mysql-test - connect.drop-open-error is failing (regression)</issue>
  <issue tracker="bnc" id="1185870">VUL-0: CVE-2021-2166: mysql,mariadb-100,mariadb: mysql: Server: DML unspecified vulnerability lead to complete DOS (CPU Apr 2021)</issue>
  <issue tracker="bnc" id="1198607">VUL-0: CVE-2022-27381: mariadb,mariadb-100: server crash at Field:set_default via specially crafted SQL statements.</issue>
  <issue tracker="bnc" id="914370">mariadb: rcmysql status shows "Something went wrong" after start or stop when everything was OK</issue>
  <issue tracker="bnc" id="1020890">VUL-0: CVE-2017-3313: mariadb,mysql: unspecified vulnerability affecting the MyISAM  component (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="1182739">VUL-0: mariadb: Update to 10.2.37/10.4.18/10.5.9</issue>
  <issue tracker="bnc" id="1177472">VUL-0: CVE-2020-15180: mariadb: update to 10.2.34 / 10.4.15</issue>
  <issue tracker="bnc" id="366820">mysql_upgrade file conflicts with official MySQL RPMs</issue>
  <issue tracker="bnc" id="1083087">Galera bootstrap failes work after MariaDB 10.2.13 upgrade</issue>
  <issue tracker="bnc" id="841709">mariadb 5.5.32 update is broken</issue>
  <issue tracker="bnc" id="979524">server:database/mariadb: why handlersocket plugin is removed?</issue>
  <issue tracker="bnc" id="1122198">VUL-0: mysql: Tracker bug for Oracle Critical Patch Update Advisory - January 2019</issue>
  <issue tracker="bnc" id="1116686">VUL-0: mariadb: 10.2.19,10.0.35 security release, mariadb-c-connector: 3.0.7 release</issue>
  <issue tracker="bnc" id="1198604">VUL-0: CVE-2022-27378: mariadb,mariadb-100:  server crash in Create_tmp_table:finalize</issue>
  <issue tracker="bnc" id="1160878">AUDIT-FIND: mariadb: SUSE systemd service unit is missing features that upstream uses</issue>
  <issue tracker="bnc" id="1012075">MariaDB Test Suite issue with test sys_vars.secure_file_priv.test</issue>
  <issue tracker="bnc" id="1055165">mariadb build with cassandra enabled</issue>
  <issue tracker="bnc" id="1170204">[Build 13.19] mariadb-client contains broken link /usr/bin/mariadb-client-test</issue>
  <issue tracker="bnc" id="1020882">VUL-0: CVE-2017-3238: mariadb,mysql: unspecified vulnerability affecting the Optimizer component (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="1112421">VUL-0: CVE-2018-3143: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="1112384">VUL-0: CVE-2018-3185: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="1055268">MariaDB configurations are not overwritable</issue>
  <issue tracker="bnc" id="437293">obsolete -XXbit packages during system upgrade</issue>
  <issue tracker="bnc" id="989922">VUL-0: CVE-2016-3615: mysql: Unspecified vulnerability in subcomponent dml</issue>
  <issue tracker="bnc" id="986251">lost+found directory causes mysql_upgrade to fail</issue>
  <issue tracker="bnc" id="829430">[Crash] Libreoffice 4.0 stable: missing dependency libmysqlclient_r.so for libreoffice-base-drivers-mysql package</issue>
  <issue tracker="bnc" id="1173028">mariadb is not packaged properly according to systemd devs</issue>
  <issue tracker="bnc" id="1160883">AUDIT-FIND: mariadb: mysql-systemd-helper performs operations redundant to systemd-tmpfiles configuration</issue>
  <issue tracker="bnc" id="1058374">[mariadb my.cnf] Use "bind-address =" directive and SSL section settings in default my.cnf</issue>
  <issue tracker="bnc" id="1112377">VUL-0: CVE-2018-3284: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="1005582">VUL-0: CVE-2016-8283: mysql: Unspecified vulnerability in subcomponent Types</issue>
  <issue tracker="bnc" id="779476">VUL-0: mariadb/mysql: CVE-2012-4414: Multiple SQL injections in MySQL/MariaDB</issue>
  <issue tracker="bnc" id="1020896">VUL-0: CVE-2017-3318: mariadb,mysql: unspecified vulnerability affecting Error Handling (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="1060110">The mariadb install script depends on hostname but does not require it</issue>
  <issue tracker="bnc" id="1174559">[Regression] SLES 15 SP2 - mariadb version 10.4.13 is crashing while creating tables for keystone database of powervc</issue>
  <issue tracker="bnc" id="1178428">VUL-0: CVE-2020-14812,CVE-2020-14765,CVE-2020-14776, CVE-2020-14789: mariadb: Update to 10.2.36/10.4.17</issue>
  <issue tracker="bnc" id="1201163">VUL-0: CVE-2022-32083: mariadb: segmentation fault via the component Item_subselect:init_expr_cache_tracker</issue>
  <issue tracker="bnc" id="1160912">VUL-0: mariadb: chmod in %post in user controlled directory</issue>
  <issue tracker="bnc" id="1186031">server:database/mariadb: feature request innodb lz4 support</issue>
  <issue tracker="bnc" id="1020894">VUL-0: CVE-2017-3317: mariadb,mysql: unspecified vulnerability affecting Logging (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="1020878">VUL-0: CVE-2017-3257 mariadb,mysql: unspecified vulnerability affecting InnoDB (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="1067443">incomplete revert of the mariadb service rename</issue>
  <issue tracker="bnc" id="463586">MySQL init script fails to find itsself</issue>
  <issue tracker="bnc" id="1111858">Maria DB testsuite - test encryption.second_plugin-12863 failed</issue>
  <issue tracker="bnc" id="796164">mysql server is build without support for async io (libaio)</issue>
  <issue tracker="bnc" id="1156669">VUL-0: mariadb: 10.2.26, 10.2.27, 10.2.28, 10.2.29 releases</issue>
  <issue tracker="bnc" id="1136035">VUL-0: mariadb: 10.2.24 security release</issue>
  <issue tracker="bnc" id="989913">VUL-0: CVE-2016-3477: mysql: Unspecified vulnerability in subcomponent parser</issue>
  <issue tracker="bnc" id="387746">VUL-0: CVE-2008-2079: mysql privilege check bypassing</issue>
  <issue tracker="bnc" id="989926">VUL-0: CVE-2016-5440: mysql: Unspecified vulnerability in subcomponent rbr</issue>
  <issue tracker="bnc" id="1198628">VUL-0: CVE-2022-27376: mariadb,mariadb-100: use-after-free in the component Item_args:walk_arg</issue>
  <issue tracker="bnc" id="1112432">VUL-0: CVE-2018-3282: mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="937754">libmysqlclient_r18 package seems to have configuration issues</issue>
  <issue tracker="bnc" id="1101677">VUL-0: CVE-2018-3063: mysql: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges).</issue>
  <issue tracker="bnc" id="1198635">VUL-0: CVE-2022-27456: mariadb,mariadb-100: Use-After-Free in sql/sql_type.cc</issue>
  <issue tracker="bnc" id="792444">VUL-0: CVE-2012-5611: mysql: stack-based buffer overflow</issue>
  <issue tracker="bnc" id="429618">MySQL: Cannot create system tables with localhost as hostname</issue>
  <issue tracker="bnc" id="1198609">VUL-0: CVE-2022-27382: mariadb,mariadb-100: SEGV via component Item_field:used_tables/update_depend_map_for_order or Assertion `fixed == 1'</issue>
  <issue tracker="bnc" id="1198611">VUL-0: CVE-2022-27384: mariadb,mariadb-100: crash via component Item_subselect:init_expr_cache_tracker</issue>
  <issue tracker="bnc" id="1020877">VUL-0: CVE-2017-3244: mariadb,mysql: unspecified vulnerability affecing the DML component (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="1020873">VUL-0: CVE-2017-3312: mariadb,mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664</issue>
  <issue tracker="bnc" id="1112386">VUL-0: CVE-2018-3173: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="1201161">VUL-0: CVE-2022-32081: mariadb: use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc</issue>
  <issue tracker="bnc" id="1006539">mysql_install_db can't find data files</issue>
  <issue tracker="bnc" id="1062583">[TRACKER BUG] Stop using boost-devel</issue>
  <issue tracker="bnc" id="1118754">mariadb: PerconaFT is AGPL and should be removed from the package</issue>
  <issue tracker="bnc" id="420313">broken library list in mysql_config --libs output</issue>
  <issue tracker="bnc" id="1180014">openSUSE Leap 15.2 imposes unexpectedly low open files limit (1024) , causing MariaDB / MySQL to crash with errors:  Too many open files</issue>
  <issue tracker="bnc" id="998309">VUL-0: CVE-2016-6662: mysql,mariadb: Remote Root Code Execution / Privilege Escalation</issue>
  <issue tracker="bnc" id="921955">mariadb package (mysql-devel) does not exist for 13.2 ports ppc</issue>
  <issue tracker="bnc" id="1019948">mariadb even tumbleweed version is super old.</issue>
  <issue tracker="bnc" id="520876">Update to mysql-5.1.35-34.1 fails to restart mysql</issue>
  <issue tracker="bnc" id="425079">VUL-0: MySQL incomplete fix for CVE-2008-2079</issue>
  <issue tracker="bnc" id="1198637">VUL-0: CVE-2022-27458: mariadb,mariadb-100: Use-After-Free in sql/sql_string.h</issue>
  <issue tracker="bnc" id="1005566">VUL-0: CVE-2016-5626: mysql: Unspecified vulnerability in subcomponent GIS</issue>
  <issue tracker="bnc" id="557669">VUL-0: mysql: version 5.0.88 fixes security bugs</issue>
  <issue tracker="bnc" id="1175596">VUL-0: mariadb: Update to 10.2.33/10.4.14</issue>
  <issue tracker="bnc" id="1202863">VUL-0: CVE-2022-38791: mariadb-100,mariadb: data_mutex not released in compress_write causing a deadlock</issue>
  <issue tracker="bnc" id="427384">mysql: missing support for FEDERATED storage engine</issue>
  <issue tracker="bnc" id="984858">mariadb failing test main.bootstrap</issue>
  <issue tracker="bnc" id="937787">MariaDB - mysql-test - main.bootstrap fails</issue>
  <issue tracker="bnc" id="1120041">Planned mariadb 10.2.19 update cause corruption on some alter table statements</issue>
  <issue tracker="bnc" id="1101678">VUL-0: CVE-2018-3066: mysql: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options).</issue>
  <issue tracker="bnc" id="1103342">VUL-0: CVE-2018-3064: mysql: InnoDB unspecified vulnerability (CPU Jul 2018)</issue>
  <issue tracker="bnc" id="1005558">VUL-0: CVE-2016-5584: mysql: Unspecified vulnerability in subcomponent Encryption</issue>
  <issue tracker="bnc" id="789263">openSUSE:12.2/mysql-community-server: Bug in init.d script cause logrotate failure</issue>
  <issue tracker="bnc" id="525325">[server:database/mysql] mysqlhotcopy locks failure; knwon bug w/ fix available</issue>
  <issue tracker="bnc" id="983938">`After=syslog.target` left-overs in several unit files</issue>
  <issue tracker="bnc" id="1201168">VUL-0: CVE-2022-32088: mariadb: segmentation fault via the component Exec_time_tracker:get_loops/Filesort_tracker:report_use/filesort</issue>
  <issue tracker="bnc" id="1160285">AUDIT-0: mariadb: auth_pam_tool needs SUID root</issue>
  <issue tracker="bnc" id="1041525">[snapshot 20170527 gcc7] MariaDB crashes often</issue>
  <issue tracker="bnc" id="1112391">VUL-0: CVE-2018-3277: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="1020976">mysql init script: add umask 077 to create files with correct permissions</issue>
  <issue tracker="bnc" id="1008253">VUL-0: CVE-2016-6664: mariadb,mysql: Root Privilege Escalation</issue>
  <issue tracker="bnc" id="1201167">VUL-0: CVE-2022-32087: mariadb: segmentation fault via the component Item_args:walk_args</issue>
  <issue tracker="bnc" id="1199928">VUL-0: mariadb,mariadb-100: Fixed multiple vulnerabilities</issue>
  <issue tracker="bnc" id="1112368">VUL-0: CVE-2018-3174: mysql: Client programs unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="1005564">VUL-0: CVE-2016-5624: mysql: Unspecified vulnerability in subcomponent DML</issue>
  <issue tracker="bnc" id="1198630">VUL-0: CVE-2022-27446: mariadb-100,mariadb: Segmentation Fault in sql/item_cmpfunc.h</issue>
  <issue tracker="bnc" id="934789">VUL-0: mariadb/mysql: Logjam Attack: mysql uses 512 bit dh groups in SSL</issue>
  <issue tracker="bnc" id="1132666">mariadb multiple instances fail to load</issue>
  <issue tracker="bnc" id="889126">MariaDB config files not seen by Unix non-root users. Permission Problem in Package</issue>
  <issue tracker="bnc" id="1160895">VUL-0: CVE-2019-18901: mariadb: mysql-systemd-helper: race condition with mysql_upgrade_info</issue>
  <issue tracker="bnc" id="1201166">VUL-0: CVE-2022-32086: mariadb: segmentation fault via the component Item_field:fix_outer_field</issue>
  <issue tracker="bnc" id="963810">FATE #319006 - mariadb -  changes in logging</issue>
  <issue tracker="bnc" id="1198605">VUL-0: CVE-2022-27379: mariadb,mariadb-100: server crash in component Arg_comparator:compare_real_fixed</issue>
  <issue tracker="bnc" id="1192497">VUL-0: CVE-2021-35604: mysql,mariadb,mariadb-100: InnoDB allows high privileged attacker with network access via multiple protocols to compromise MySQL Server</issue>
  <issue tracker="bnc" id="1166781">mysql / mariadb database broken after update from 15.1 to 15.2 beta</issue>
  <issue tracker="bnc" id="1198610">VUL-0: CVE-2022-27383: mariadb,mariadb-100: use-after-free in my_strcasecmp_8bit() of ctype-simple.c</issue>
  <issue tracker="bnc" id="1185872">VUL-0: CVE-2021-2154: mysql,mariadb,mariadb-100: mysql: Server: DML unspecified vulnerability can lead to complete DOS (CPU Apr 2021)</issue>
  <issue tracker="bnc" id="1198606">VUL-0: CVE-2022-27380: mariadb,mariadb-100: server crash at my_decimal:operator=</issue>
  <issue tracker="bnc" id="1198633">VUL-0: CVE-2022-27449: mariadb-100,mariadb: Segmentation Fault in sql/item_func.cc</issue>
  <issue tracker="bnc" id="1127027">mysql_install_db fails because basedir is incorrect</issue>
  <issue tracker="bnc" id="1195325">VUL-1: CVE-2021-46657: mariadb-100,mariadb: get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY.</issue>
  <issue tracker="bnc" id="1201164">VUL-0: CVE-2022-32084: mariadb: segmentation fault via the component sub_select</issue>
  <issue tracker="bnc" id="1198629">VUL-0: CVE-2022-27445: mariadb-100,mariadb: Segmentation Fault in sql/sql_window.cc</issue>
  <issue tracker="bnc" id="1182255">MariaDB 10.4.17 crashes due to conflicting lock [ref:_00D1igLOd._5001iYK52Q:ref]</issue>
  <issue tracker="bnc" id="1112404">VUL-0: CVE-2018-3200: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="353120">multi mysql server support in rcmysql</issue>
  <issue tracker="bnc" id="1013882">VUL-0: CVE-2016-9843: zlib: Big-endian out-of-bounds pointer</issue>
  <issue tracker="bnc" id="1198631">VUL-0: CVE-2022-27447: mariadb-100,mariadb: Use-After-Free in sql/sql_string.h</issue>
  <issue tracker="bnc" id="1168380">mariadb: mysql_upgrade creating empty global_priv table</issue>
  <issue tracker="bnc" id="1198636">VUL-0: CVE-2022-27457: mariadb,mariadb-100: Use-After-Free in strings/ctype-latin1.c</issue>
  <issue tracker="bnc" id="1112415">VUL-0: CVE-2018-3162: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="937767">mysql-community-server-client: The mysql server keeps restarting every minute</issue>
  <issue tracker="bnc" id="1005569">VUL-0: CVE-2016-5629: mysql: Unspecified vulnerability in subcomponent Federated</issue>
  <issue tracker="bnc" id="1189320">VUL-0: mariadb: 10.2.40 and 10.4.21 release</issue>
  <issue tracker="bnc" id="1005555">VUL-0: CVE-2016-3492: mysql: Unspecified vulnerability in subcomponent Optimizer</issue>
  <issue tracker="bnc" id="1200105">/usr/lib/mysql/mysql-systemd-helper is unaware of custom group, therfore Operation not permitted for chown command</issue>
  <issue tracker="bnc" id="1098683">Broken dependency: libxml2-devel-2.9.7-lp150.1.7.x86_64 requires readline-devel, but this requirement cannot be provided not installable providers: readline-devel-7.0-lp150.7.8.x86_64[repo-oss]</issue>
  <issue tracker="bnc" id="1020885">VUL-0: CVE-2017-3265: mariadb,mysql: unsafe chmod/chown use in init script (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="1022428">VUL-0: CVE-2017-3302: mariadb: Use after free in libmysqlclient.so</issue>
  <issue tracker="bnc" id="1112417">VUL-0: CVE-2018-3156: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue>
  <issue tracker="bnc" id="1195339">VUL-1: CVE-2021-46659: mariadb-100,mariadb: crash in st_select_lex::mark_as_dependent with VIEW, aggregate and subquery</issue>
  <issue tracker="bnc" id="902396">mariadb: shell client control sequences not working (xterm, kde konsole)</issue>
  <issue tracker="bnc" id="539243">MySQL changes</issue>
  <issue tracker="bnc" id="1201170">VUL-0: CVE-2022-32091: mariadb: use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc</issue>
  <issue tracker="bnc" id="1112767">MySQL logrotate not working</issue>
  <issue tracker="bnc" id="1173516">EMU: Regression : MariaDB crashes at db_sync from Keystone</issue>
  <issue tracker="bnc" id="1101676">VUL-0: CVE-2018-3058: mysql: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM).</issue>
  <issue tracker="bnc" id="539249">/etc/my.cnf is writeable for group mysql</issue>
  <issue tracker="bnc" id="525065">libqt4-sql-mysql-32bit-4.5.2-1.2.x86_64 requires libmysqlclient_r.so.16, but this requirement cannot be provided</issue>
  <issue tracker="bnc" id="1043328">Update mariadb in TW to 10.2 and drop comat with mysql</issue>
  <issue tracker="bnc" id="435519">Bash syntax errors appear in /etc/init.d/mysql</issue>
  <issue tracker="bnc" id="357634">MySQL README.SUSE is outdated</issue>
  <issue tracker="bnc" id="1201165">VUL-0: CVE-2022-32085: mariadb: segmentation fault via the component Item_func_in:cleanup/Item:cleanup_processor</issue>
  <issue tracker="bnc" id="1020875">VUL-0: CVE-2017-3258: mariadb,mysql:  unspecified vulnerability in the DDL component (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="1144314">suggestion to change default my.cnf (skip-networking, slow log, sql_mode as in MySQL, rocksdb.cnf)</issue>
  <issue tracker="bnc" id="1038740">mysql-community-server (5.6.36-24.3.3): Wrong permission on directory /var/run/mysql</issue>
  <issue tracker="bnc" id="1020884">VUL-0: CVE-2017-3291: mariadb,mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="635645">mysql init script fails to start when SELinux is enabled</issue>
  <issue tracker="bnc" id="943096">mariadb unclean shutdown</issue>
  <issue tracker="bnc" id="747811">mariadb: install-info: warning: no info dir entry in `/usr/share/info/mysql.info.gz'</issue>
  <issue tracker="bnc" id="1198613">VUL-0: CVE-2022-27387: mariadb,mariadb-100: global-buffer-overflow in decimal_bin_size of decimal.c</issue>
  <issue tracker="bnc" id="371000">mysqld_multi starts twice as many servers</issue>
  <issue tracker="bnc" id="1001367">VUL-0: CVE-2016-6663: mariadb,mysql: Privilege Escalation / Race Condition</issue>
  <issue tracker="bnc" id="1142909">mariadb depended from python2 and this depence not specify in spec-file.</issue>
  <issue tracker="bnc" id="359522">mysql restart broke with last update</issue>
  <issue tracker="bnc" id="1143215">mariadb 10.3.16 after any update Plugin 'ROCKSDB' registration as a STORAGE ENGINE failed</issue>
  <issue tracker="bnc" id="1041891">Make mariadb tests pass and exclude failures</issue>
  <issue tracker="bnc" id="1196016">VUL-0: mariadb: 10.4.23 and 10.4.24 releases</issue>
  <issue tracker="bnc" id="971456">mariadb installation error: Too many levels of symbolic links</issue>
  <issue tracker="bnc" id="1198612">VUL-0: CVE-2022-27386: mariadb,mariadb-100: SEGV via the component sql/sql_class.cc.</issue>
  <issue tracker="bnc" id="1122475">mariadb-test requires libmariadb_plugins</issue>
  <issue tracker="bnc" id="1195334">VUL-1: CVE-2021-46658: mariadb,mariadb-100: save_window_function_values allows an application crash because of incorrect handling of with_window_func=true for a subquery.</issue>
  <issue tracker="bnc" id="1039034">no ODBC support in MariaDB Server</issue>
  <issue tracker="bnc" id="1198603">VUL-0: CVE-2022-27377: mariadb,mariadb-100: use-after-free in the component Item_func_in:cleanup() of item_cmpfunc.h</issue>
  <issue tracker="bnc" id="989919">VUL-0: CVE-2016-3521: mysql: Unspecified vulnerability in subcomponent types</issue>
  <issue tracker="bnc" id="1020891">VUL-0: CVE-2017-3243: mariadb,mysql: unspecified vulnerability affecting the Charsets component (CPU Jan 2017)</issue>
  <issue tracker="bnc" id="957174">VUL-0: CVE-2015-5969: mariadb, mysql: Information leak via mysql-systemd-helper</issue>
  <issue tracker="fate" id="323756"/>
  <issue tracker="fate" id="324329"/>
  <issue tracker="fate" id="323738"/>
  <issue tracker="fate" id="323280"/>
  <packager>dspinella</packager>
  <rating>moderate</rating>
  <category>recommended</category>
  <summary>Recommended update for mariadb104</summary>
  <description>This update for mariadb104 fixes the following issues:

- Implement version 10.4 of MariaDB (jsc#PED-2455):
  * It is possible to use more than one authentication plugin for each user account.
  * The root user account is being created with the ability to use two authentication plugins.
  * All user accounts, passwords, and global privileges are now stored in the mysql.global_priv table.
  * Is being supported for User Password Expiry, which is not active by default.
  * Faster privilege checks for MariaDB setups with many user accounts or many database grants.
- Update mysql-systemd-helper to be aware of custom group (bsc#1200105)
- MariaDB is now support lz4 compression for 'INNODB'. (bsc#1186031)
- Add 'mysql-user.conf' file to enable systemd generating mysql user in containers. (bsc#1173028)
- Fixes an issue when MariaDB is ignoring the value of the parameter 'open_files_limit' in the global variables. (bsc#1180014)

</description>
</patchinfo>
openSUSE Build Service is sponsored by