Security update for mariadb
Announcement ID: | SUSE-SU-2022:2003-1 |
---|---|
Rating: | important |
References: | |
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 25 vulnerabilities can now be installed.
Description:
This update for mariadb fixes the following issues:
Update to 10.5.16 (bsc#1199928):
- CVE-2021-46669 (bsc#1199928)
- CVE-2022-27376 (bsc#1198628)
- CVE-2022-27377 (bsc#1198603)
- CVE-2022-27378 (bsc#1198604)
- CVE-2022-27379 (bsc#1198605)
- CVE-2022-27380 (bsc#1198606)
- CVE-2022-27381 (bsc#1198607)
- CVE-2022-27382 (bsc#1198609)
- CVE-2022-27383 (bsc#1198610)
- CVE-2022-27384 (bsc#1198611)
- CVE-2022-27386 (bsc#1198612)
- CVE-2022-27387 (bsc#1198613)
- CVE-2022-27444 (bsc#1198634)
- CVE-2022-27445 (bsc#1198629)
- CVE-2022-27446 (bsc#1198630)
- CVE-2022-27447 (bsc#1198631)
- CVE-2022-27448 (bsc#1198632)
- CVE-2022-27449 (bsc#1198633)
- CVE-2022-27451 (bsc#1198639)
- CVE-2022-27452 (bsc#1198640)
- CVE-2022-27455 (bsc#1198638)
- CVE-2022-27456 (bsc#1198635)
- CVE-2022-27457 (bsc#1198636)
-
CVE-2022-27458 (bsc#1198637)
-
The following issue is not affecting this package: CVE-2022-21427
External refernences:
- https://mariadb.com/kb/en/library/mariadb-10516-release-notes
- https://mariadb.com/kb/en/library/mariadb-10516-changelog
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.3
zypper in -t patch SUSE-2022-2003=1
-
SUSE Package Hub 15 15-SP3
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2003=1
-
Server Applications Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-2003=1
-
Galera for Ericsson 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-ERICSSON-2022-2003=1
Package List:
-
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
- mariadb-client-10.5.16-150300.3.18.1
- libmariadbd19-debuginfo-10.5.16-150300.3.18.1
- mariadb-10.5.16-150300.3.18.1
- mariadb-bench-debuginfo-10.5.16-150300.3.18.1
- mariadb-client-debuginfo-10.5.16-150300.3.18.1
- mariadb-test-10.5.16-150300.3.18.1
- mariadb-galera-10.5.16-150300.3.18.1
- mariadb-test-debuginfo-10.5.16-150300.3.18.1
- mariadb-debuginfo-10.5.16-150300.3.18.1
- mariadb-tools-10.5.16-150300.3.18.1
- mariadb-rpm-macros-10.5.16-150300.3.18.1
- libmariadbd19-10.5.16-150300.3.18.1
- mariadb-tools-debuginfo-10.5.16-150300.3.18.1
- mariadb-bench-10.5.16-150300.3.18.1
- mariadb-debugsource-10.5.16-150300.3.18.1
- libmariadbd-devel-10.5.16-150300.3.18.1
-
openSUSE Leap 15.3 (noarch)
- mariadb-errormessages-10.5.16-150300.3.18.1
-
SUSE Package Hub 15 15-SP3 (aarch64 ppc64le s390x x86_64)
- mariadb-galera-10.5.16-150300.3.18.1
-
Server Applications Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- mariadb-client-10.5.16-150300.3.18.1
- libmariadbd19-debuginfo-10.5.16-150300.3.18.1
- mariadb-10.5.16-150300.3.18.1
- mariadb-client-debuginfo-10.5.16-150300.3.18.1
- mariadb-debuginfo-10.5.16-150300.3.18.1
- libmariadbd19-10.5.16-150300.3.18.1
- mariadb-tools-debuginfo-10.5.16-150300.3.18.1
- mariadb-tools-10.5.16-150300.3.18.1
- mariadb-debugsource-10.5.16-150300.3.18.1
- libmariadbd-devel-10.5.16-150300.3.18.1
-
Server Applications Module 15-SP3 (noarch)
- mariadb-errormessages-10.5.16-150300.3.18.1
-
Galera for Ericsson 15 SP3 (x86_64)
- mariadb-galera-10.5.16-150300.3.18.1
References:
- https://www.suse.com/security/cve/CVE-2021-46669.html
- https://www.suse.com/security/cve/CVE-2022-21427.html
- https://www.suse.com/security/cve/CVE-2022-27376.html
- https://www.suse.com/security/cve/CVE-2022-27377.html
- https://www.suse.com/security/cve/CVE-2022-27378.html
- https://www.suse.com/security/cve/CVE-2022-27379.html
- https://www.suse.com/security/cve/CVE-2022-27380.html
- https://www.suse.com/security/cve/CVE-2022-27381.html
- https://www.suse.com/security/cve/CVE-2022-27382.html
- https://www.suse.com/security/cve/CVE-2022-27383.html
- https://www.suse.com/security/cve/CVE-2022-27384.html
- https://www.suse.com/security/cve/CVE-2022-27386.html
- https://www.suse.com/security/cve/CVE-2022-27387.html
- https://www.suse.com/security/cve/CVE-2022-27444.html
- https://www.suse.com/security/cve/CVE-2022-27445.html
- https://www.suse.com/security/cve/CVE-2022-27446.html
- https://www.suse.com/security/cve/CVE-2022-27447.html
- https://www.suse.com/security/cve/CVE-2022-27448.html
- https://www.suse.com/security/cve/CVE-2022-27449.html
- https://www.suse.com/security/cve/CVE-2022-27451.html
- https://www.suse.com/security/cve/CVE-2022-27452.html
- https://www.suse.com/security/cve/CVE-2022-27455.html
- https://www.suse.com/security/cve/CVE-2022-27456.html
- https://www.suse.com/security/cve/CVE-2022-27457.html
- https://www.suse.com/security/cve/CVE-2022-27458.html
- https://bugzilla.suse.com/show_bug.cgi?id=1198603
- https://bugzilla.suse.com/show_bug.cgi?id=1198604
- https://bugzilla.suse.com/show_bug.cgi?id=1198605
- https://bugzilla.suse.com/show_bug.cgi?id=1198606
- https://bugzilla.suse.com/show_bug.cgi?id=1198607
- https://bugzilla.suse.com/show_bug.cgi?id=1198609
- https://bugzilla.suse.com/show_bug.cgi?id=1198610
- https://bugzilla.suse.com/show_bug.cgi?id=1198611
- https://bugzilla.suse.com/show_bug.cgi?id=1198612
- https://bugzilla.suse.com/show_bug.cgi?id=1198613
- https://bugzilla.suse.com/show_bug.cgi?id=1198628
- https://bugzilla.suse.com/show_bug.cgi?id=1198629
- https://bugzilla.suse.com/show_bug.cgi?id=1198630
- https://bugzilla.suse.com/show_bug.cgi?id=1198631
- https://bugzilla.suse.com/show_bug.cgi?id=1198632
- https://bugzilla.suse.com/show_bug.cgi?id=1198633
- https://bugzilla.suse.com/show_bug.cgi?id=1198634
- https://bugzilla.suse.com/show_bug.cgi?id=1198635
- https://bugzilla.suse.com/show_bug.cgi?id=1198636
- https://bugzilla.suse.com/show_bug.cgi?id=1198637
- https://bugzilla.suse.com/show_bug.cgi?id=1198638
- https://bugzilla.suse.com/show_bug.cgi?id=1198639
- https://bugzilla.suse.com/show_bug.cgi?id=1198640
- https://bugzilla.suse.com/show_bug.cgi?id=1199928