[SSA:2022-228-01] mariadb
New mariadb packages are available for Slackware 15.0 and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog
patches/packages/mariadb-10.5.17-i586-1_slack15.0.txz: Upgraded.
This update fixes bugs and several security issues.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/mariadb-10.5.17-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/mariadb-10.5.17-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/mariadb-10.6.9-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/mariadb-10.6.9-x86_64-1.txz
MD5 signatures
Slackware 15.0 package:
dc848f83c7437cbb1d3b1b17231afe2e mariadb-10.5.17-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
e527bd214c79978a8df7095b0ae91f21 mariadb-10.5.17-x86_64-1_slack15.0.txz
Slackware -current package:
397b5e048fe6e42c4b40f6bc18b404eb ap/mariadb-10.6.9-i586-1.txz
Slackware x86_64 -current package:
3957a00f621edaf7bbda8a18daf82347 ap/mariadb-10.6.9-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg mariadb-10.5.17-i586-1_slack15.0.txz
Then, restart the database server:
# sh /etc/rc.d/rc.mysqld restart
- ID
- SSA:2022-228-01
- Severity
- high
- Severity from
- CVE-2022-32082
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.371382
- Published
-
2022-08-16T18:58:18
(2 years ago) - Modified
-
2022-08-16T18:58:18
(2 years ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALAS-2022-1602
- ALAS-2022-1640
- ALAS2-2022-1772
- ALPINE:CVE-2018-25032
- ALPINE:CVE-2022-32081
- ALPINE:CVE-2022-32082
- ALPINE:CVE-2022-32084
- ALPINE:CVE-2022-32089
- ALPINE:CVE-2022-32091
- ALSA-2022:1642
- ALSA-2022:2201
- ALSA-2022:7813
- ALSA-2023:5259
- ALSA-2023:5683
- ALSA-2023:5684
- ASA-202204-3
- DSA-5111-1
- ELSA-2022-1642
- ELSA-2022-2201
- ELSA-2022-2213
- ELSA-2022-4584
- ELSA-2022-4592
- ELSA-2022-8420
- ELSA-2022-9565
- ELSA-2023-5259
- ELSA-2023-5683
- ELSA-2023-5684
- FEDORA-2022-12b89e2aad
- FEDORA-2022-333df1c4aa
- FEDORA-2022-3a92250fd5
- FEDORA-2022-413a80a102
- FEDORA-2022-61cf1c64f6
- FEDORA-2022-b58a85e167
- FEDORA-2022-cf88f807f9
- FEDORA-2022-dbd2935e44
- FEDORA-2022-e0e9a43546
- FREEBSD:36D10AF7-248D-11ED-856E-D4C9EF517024
- FREEBSD:38F2E3A0-B61E-11EC-9EBC-1C697AA5A594
- FREEBSD:8E150606-08C9-11ED-856E-D4C9EF517024
- GLSA-202210-42
- GLSA-202405-22
- GLSA-202405-25
- MS:CVE-2018-25032
- MS:CVE-2022-32081
- MS:CVE-2022-32091
- openSUSE-SU-2022:1061-1
- RHSA-2022:1642
- RHSA-2022:2201
- RHSA-2022:2213
- RHSA-2022:4584
- RHSA-2022:4592
- RHSA-2022:7813
- RHSA-2022:8420
- RHSA-2023:5259
- RHSA-2023:5683
- RHSA-2023:5684
- RLSA-2022:1642
- RLSA-2022:2201
- RUBYSEC:NOKOGIRI-2018-25032
- SSA:2022-087-01
- SUSE-SU-2022:1023-1
- SUSE-SU-2022:1043-1
- SUSE-SU-2022:1061-1
- SUSE-SU-2022:1061-2
- SUSE-SU-2022:1062-1
- SUSE-SU-2022:3159-1
- SUSE-SU-2022:3225-1
- SUSE-SU-2022:3391-1
- SUSE-SU-2023:2835-1
- SUSE-SU-2023:3174-1
- USN-5355-1
- USN-5355-2
- USN-5359-1
- USN-5359-2
- USN-5739-1
- USN-6736-1
- USN-6736-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-current | slackware | mariadb | < 10.6.9 | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=x86_64&distro=slackware64-15.0 | slackware | mariadb | < 10.5.17 | slackware64-15.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-current | slackware | mariadb | < 10.6.9 | slackware-current | i586 | |
Affected | pkg:slackbuild/slackware/mariadb?arch=i586&distro=slackware-15.0 | slackware | mariadb | < 10.5.17 | slackware-15.0 | i586 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |