[SSA:2017-087-01] mariadb
New mariadb packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
patches/packages/mariadb-10.0.30-i586-1_slack14.2.txz: Upgraded.
This update fixes security issues:
Crash in libmysqlclient.so.
Difficult to exploit vulnerability allows low privileged attacker with
logon to compromise the server. Successful attacks of this vulnerability
can result in unauthorized access to data.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mariadb-10.0.30-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mariadb-10.0.30-x86_64-1_slack14.2.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/mariadb-10.0.30-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/mariadb-10.0.30-x86_64-1.txz
MD5 signatures
Slackware 14.2 package:
9b6c082f717f4d347dcb6ab4f7cdd0c2 mariadb-10.0.30-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
aa9b259310ad55091a98bf1d91c06d69 mariadb-10.0.30-x86_64-1_slack14.2.txz
Slackware -current package:
9d8d5cc368dea8facaa23870b24a0d6e ap/mariadb-10.0.30-i586-1.txz
Slackware x86_64 -current package:
7b93dcf1483cc564db749c81f97de5af ap/mariadb-10.0.30-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg mariadb-10.0.30-i586-1_slack14.2.txz
Then, restart the database server:
# sh /etc/rc.d/rc.mysqld restart
Package | Affected Version |
---|---|
pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-current | < 10.0.30 |
pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-14.2 | < 10.0.30 |
pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-current | < 10.0.30 |
pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-14.2 | < 10.0.30 |
- ID
- SSA:2017-087-01
- Severity
- high
- Severity from
- CVE-2017-3302
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware-security.370121
- Published
-
2017-03-28T20:35:48
(7 years ago) - Modified
-
2017-03-28T20:35:48
(7 years ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALAS-2017-789
- ALAS-2017-790
- ALPINE:CVE-2017-3302
- ALPINE:CVE-2017-3313
- CPANSA-DBD-MariaDB-2017-01
- DSA-3767-1
- DSA-3809-1
- DSA-3834-1
- ELSA-2017-2192
- FEDORA-2017-09dd8907da
- FEDORA-2017-0f44f2b8c8
- FEDORA-2017-2c0609b92a
- FEDORA-2017-801e01d1ed
- FEDORA-2017-8425f676f2
- FEDORA-2018-d955395c08
- FREEBSD:4D2F9D09-DDB7-11E6-A9A5-B499BAEBFEAF
- FREEBSD:7C27192F-0BC3-11E7-9940-B499BAEBFEAF
- GLSA-201702-17
- RHSA-2017:2192
- SUSE-SU-2017:0408-1
- SUSE-SU-2017:1137-1
- SUSE-SU-2017:1311-1
- SUSE-SU-2017:1315-1
- SUSE-SU-2018:1853-1
- USN-3174-1
- USN-3269-1
- USN-3357-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-current | slackware | mariadb | < 10.0.30 | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-14.2 | slackware | mariadb | < 10.0.30 | slackware64-14.2 | x86_64 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-current | slackware | mariadb | < 10.0.30 | slackware-current | i586 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-14.2 | slackware | mariadb | < 10.0.30 | slackware-14.2 | i586 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |