Security update for mariadb
Announcement ID: | SUSE-SU-2019:0119-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 12 vulnerabilities and has five security fixes can now be installed.
Description:
This update for mariadb to version 10.2.19 fixes the following issues: (bsc#1116686)
Security issues fixed:
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)
- CVE-2018-3282, CVE-2018-3174, CVE-2018-3143, CVE-2018-3156, CVE-2018-3251, CVE-2018-3185, CVE-2018-3277, CVE-2018-3162, CVE-2018-3173, CVE-2018-3200, CVE-2018-3284: Fixed multiple denial of service vulnerabilities (bsc#1112432, bsc#1112368, bsc#1112421, bsc#1112417, bsc#1112397, bsc#1112391, bsc#1112415, bsc#1112386, bsc#1112404, bsc#1112377, bsc#1112384)
Non-security issues fixed:
- Fixed database corruption after renaming a prefix-indexed column (bsc#1120041)
- Remove PerconaFT from the package as it has a AGPL license (bsc#1118754)
- Enable testing for client plugins (bsc#1111859)
- Improve test coverage by keeping debug_key_management.so (bsc#1111858)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP4
zypper in -t patch SUSE-SLE-BSK-12-SP4-2019-119=1
-
SUSE Linux Enterprise Desktop 12 SP4
zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-119=1
-
SUSE Linux Enterprise High Performance Computing 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-119=1
-
SUSE Linux Enterprise Server 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-119=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-119=1
Package List:
-
SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP4 (ppc64le s390x x86_64)
- mariadb-test-10.2.21-3.7.1
- mariadb-bench-10.2.21-3.7.1
- mariadb-bench-debuginfo-10.2.21-3.7.1
- mariadb-test-debuginfo-10.2.21-3.7.1
-
SUSE Linux Enterprise Desktop 12 SP4 (x86_64)
- mariadb-debugsource-10.2.21-3.7.1
- mariadb-10.2.21-3.7.1
- mariadb-client-debuginfo-10.2.21-3.7.1
- mariadb-client-10.2.21-3.7.1
- mariadb-debuginfo-10.2.21-3.7.1
-
SUSE Linux Enterprise Desktop 12 SP4 (noarch)
- mariadb-errormessages-10.2.21-3.7.1
-
SUSE Linux Enterprise High Performance Computing 12 SP4 (aarch64 x86_64)
- mariadb-debugsource-10.2.21-3.7.1
- mariadb-10.2.21-3.7.1
- mariadb-client-debuginfo-10.2.21-3.7.1
- mariadb-tools-debuginfo-10.2.21-3.7.1
- mariadb-tools-10.2.21-3.7.1
- mariadb-client-10.2.21-3.7.1
- mariadb-debuginfo-10.2.21-3.7.1
-
SUSE Linux Enterprise High Performance Computing 12 SP4 (noarch)
- mariadb-errormessages-10.2.21-3.7.1
-
SUSE Linux Enterprise Server 12 SP4 (aarch64 ppc64le s390x x86_64)
- mariadb-debugsource-10.2.21-3.7.1
- mariadb-10.2.21-3.7.1
- mariadb-client-debuginfo-10.2.21-3.7.1
- mariadb-tools-debuginfo-10.2.21-3.7.1
- mariadb-tools-10.2.21-3.7.1
- mariadb-client-10.2.21-3.7.1
- mariadb-debuginfo-10.2.21-3.7.1
-
SUSE Linux Enterprise Server 12 SP4 (noarch)
- mariadb-errormessages-10.2.21-3.7.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (ppc64le x86_64)
- mariadb-debugsource-10.2.21-3.7.1
- mariadb-10.2.21-3.7.1
- mariadb-client-debuginfo-10.2.21-3.7.1
- mariadb-tools-debuginfo-10.2.21-3.7.1
- mariadb-tools-10.2.21-3.7.1
- mariadb-client-10.2.21-3.7.1
- mariadb-debuginfo-10.2.21-3.7.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (noarch)
- mariadb-errormessages-10.2.21-3.7.1
References:
- https://www.suse.com/security/cve/CVE-2016-9843.html
- https://www.suse.com/security/cve/CVE-2018-3143.html
- https://www.suse.com/security/cve/CVE-2018-3156.html
- https://www.suse.com/security/cve/CVE-2018-3162.html
- https://www.suse.com/security/cve/CVE-2018-3173.html
- https://www.suse.com/security/cve/CVE-2018-3174.html
- https://www.suse.com/security/cve/CVE-2018-3185.html
- https://www.suse.com/security/cve/CVE-2018-3200.html
- https://www.suse.com/security/cve/CVE-2018-3251.html
- https://www.suse.com/security/cve/CVE-2018-3277.html
- https://www.suse.com/security/cve/CVE-2018-3282.html
- https://www.suse.com/security/cve/CVE-2018-3284.html
- https://bugzilla.suse.com/show_bug.cgi?id=1013882
- https://bugzilla.suse.com/show_bug.cgi?id=1111858
- https://bugzilla.suse.com/show_bug.cgi?id=1111859
- https://bugzilla.suse.com/show_bug.cgi?id=1112368
- https://bugzilla.suse.com/show_bug.cgi?id=1112377
- https://bugzilla.suse.com/show_bug.cgi?id=1112384
- https://bugzilla.suse.com/show_bug.cgi?id=1112386
- https://bugzilla.suse.com/show_bug.cgi?id=1112391
- https://bugzilla.suse.com/show_bug.cgi?id=1112397
- https://bugzilla.suse.com/show_bug.cgi?id=1112404
- https://bugzilla.suse.com/show_bug.cgi?id=1112415
- https://bugzilla.suse.com/show_bug.cgi?id=1112417
- https://bugzilla.suse.com/show_bug.cgi?id=1112421
- https://bugzilla.suse.com/show_bug.cgi?id=1112432
- https://bugzilla.suse.com/show_bug.cgi?id=1116686
- https://bugzilla.suse.com/show_bug.cgi?id=1118754
- https://bugzilla.suse.com/show_bug.cgi?id=1120041