Updated mariadb packages fix security vulnerabilities
Publication date: 09 Nov 2016Modification date: 09 Nov 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-6663 , CVE-2016-3492 , CVE-2016-5584 , CVE-2016-5616 , CVE-2016-5624 , CVE-2016-5626 , CVE-2016-5629 , CVE-2016-7440 , CVE-2016-8283
Description
A race condition was found in the way MariaDB performed MyISAM engine table repair. A database user with shell access to the server running mysqld could use this flaw to change permissions of arbitrary files writable by the mysql system user (CVE-2016-6663). This update fixes several vulnerabilities in the MariaDB database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section (CVE-2016-3492, CVE-2016-5584, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-7440, CVE-2016-8283).
References
- https://bugs.mageia.org/show_bug.cgi?id=19693
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://rhn.redhat.com/errata/RHSA-2016-2595.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
SRPMS
5/core
- mariadb-10.0.28-1.mga5