[RLSA-2020:5500] mariadb:10.3 security, bug fix, and enhancement update

Severity Important
Affected Packages 2
CVEs 17

An update is available for Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086)

Security Fix(es):

  • mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180)

  • mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938)

  • mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974)

  • mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)

  • mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760)

  • mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780)

  • mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812)

  • mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814)

  • mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)

  • mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765)

  • mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776)

  • mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789)

  • mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812)

  • mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009)

  • Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017)

  • Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021)

  • There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077)

Package Affected Version
pkg:rpm/rockylinux/Judy?arch=x86_64&distro=rockylinux-8.4 < 1.0.5-18.module+el8.4.0+427+adf35707
pkg:rpm/rockylinux/Judy?arch=aarch64&distro=rockylinux-8.4 < 1.0.5-18.module+el8.4.0+427+adf35707
ID
RLSA-2020:5500
Severity
important
URL
https://errata.rockylinux.org/RLSA-2020:5500
Published
2020-12-15T16:03:43
(3 years ago)
Modified
2023-02-02T13:14:02
(19 months ago)
Rights
Copyright 2024 Rocky Enterprise Software Foundation
Other Advisories
Source # ID Name URL
CVE CVE-2019-2938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2938
CVE CVE-2019-2974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974
CVE CVE-2020-13249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13249
CVE CVE-2020-14765 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
CVE CVE-2020-14776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
CVE CVE-2020-14789 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
CVE CVE-2020-14812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
CVE CVE-2020-15180 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180
CVE CVE-2020-2574 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574
CVE CVE-2020-2752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752
CVE CVE-2020-2760 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2760
CVE CVE-2020-2780 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2780
CVE CVE-2020-2812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812
CVE CVE-2020-2814 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2814
CVE CVE-2021-2022 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
CVE CVE-2021-2144 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2144
CVE CVE-2021-2194 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194
Bugzilla 1764680 https://bugzilla.redhat.com/show_bug.cgi?id=1764680
Bugzilla 1764691 https://bugzilla.redhat.com/show_bug.cgi?id=1764691
Bugzilla 1798587 https://bugzilla.redhat.com/show_bug.cgi?id=1798587
Bugzilla 1830056 https://bugzilla.redhat.com/show_bug.cgi?id=1830056
Bugzilla 1830059 https://bugzilla.redhat.com/show_bug.cgi?id=1830059
Bugzilla 1830060 https://bugzilla.redhat.com/show_bug.cgi?id=1830060
Bugzilla 1830082 https://bugzilla.redhat.com/show_bug.cgi?id=1830082
Bugzilla 1835849 https://bugzilla.redhat.com/show_bug.cgi?id=1835849
Bugzilla 1839827 https://bugzilla.redhat.com/show_bug.cgi?id=1839827
Bugzilla 1890738 https://bugzilla.redhat.com/show_bug.cgi?id=1890738
Bugzilla 1890743 https://bugzilla.redhat.com/show_bug.cgi?id=1890743
Bugzilla 1890747 https://bugzilla.redhat.com/show_bug.cgi?id=1890747
Bugzilla 1890756 https://bugzilla.redhat.com/show_bug.cgi?id=1890756
Bugzilla 1894919 https://bugzilla.redhat.com/show_bug.cgi?id=1894919
Bugzilla 1899009 https://bugzilla.redhat.com/show_bug.cgi?id=1899009
Bugzilla 1899017 https://bugzilla.redhat.com/show_bug.cgi?id=1899017
Bugzilla 1899021 https://bugzilla.redhat.com/show_bug.cgi?id=1899021
Bugzilla 1899082 https://bugzilla.redhat.com/show_bug.cgi?id=1899082
Bugzilla 1899086 https://bugzilla.redhat.com/show_bug.cgi?id=1899086
Self RLSA-2020:5500 https://errata.rockylinux.org/RLSA-2020:5500
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/rockylinux/Judy?arch=x86_64&distro=rockylinux-8.4 rockylinux Judy < 1.0.5-18.module+el8.4.0+427+adf35707 rockylinux-8.4 x86_64
Affected pkg:rpm/rockylinux/Judy?arch=aarch64&distro=rockylinux-8.4 rockylinux Judy < 1.0.5-18.module+el8.4.0+427+adf35707 rockylinux-8.4 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...