Updated mariadb55-mariadb packages that fix several security issues are nowavailable for Red Hat Software Collections 1.The Red Hat Security Response Team has rated this update as having Moderatesecurity impact. Common Vulnerability Scoring System (CVSS) base scores,which give detailed severity ratings, are available for each vulnerabilityfrom the CVE links in the References section.

MariaDB is a multi-user, multi-threaded SQL database server that is binarycompatible with MySQL.This update fixes several vulnerabilities in the MariaDB database server.Information about these flaws can be found on the Oracle Critical PatchUpdate Advisory page, listed in the References section. (CVE-2014-2436,CVE-2014-2440, CVE-2014-0384, CVE-2014-2419, CVE-2014-2430, CVE-2014-2431,CVE-2014-2432, CVE-2014-2438)These updated packages upgrade MariaDB to version 5.5.37. Refer to theMariaDB Release Notes listed in the References section for a complete listof changes.All MariaDB users should upgrade to these updated packages, which correctthese issues. After installing this update, the MariaDB server daemon(mysqld) will be restarted automatically.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Software Collections 1 for RHEL 6

    MD5: f86be8041d2bff61d9aafad950cca224SHA-256: e5cba178684e004eba4c8d8baedc89ef24607137557a7449ea3512a42639f992
    MD5: ac5549523c246b9c62d0e8cd34c86fcdSHA-256: 75f7055321bc2a20c94de848181cc0dfb6afa8770c9ab504f43fab89ee586449
    MD5: 098bab7ae58cddf62561b23d8161503eSHA-256: f7e7e89d08bd6946657101ab5f1d7273bd4217b6eea815ee865d3d87a18661d5
    MD5: 531321515cbf6165b39e6179079cc55aSHA-256: 716da8de0e556b8b8ee5444d7bf44e3c34bc7959f2728690e96486357270a042
    MD5: aa711a526fca2544408ed2510062f434SHA-256: eb9d5cab6bbdde75fa198e39ecce120318be73475ec6fa7ba18e01a8f3e26edb
    MD5: bdfe2a0907cdff9f159c11d7279ce30eSHA-256: 28aa3b047e34d14fe1db5ca3cc835ece0522c98551ae03d19ac470d7abd0da2a
    MD5: ea38e9f45c854dd5fa206e56abdc7dd7SHA-256: 7ce38ec70ed2773e2f8a9c52f678656273758f9e16689ec59f2cc3906a7d6f02
    MD5: a581df3ddf4f511713c2c987cd9c186dSHA-256: e395b43599e5e053746c999b43fb73a88b6d77b36c0acf7a4ae8711e2f231de2
(The unlinked packages above are only available from the Red Hat Network)
1088133 – CVE-2014-0384 mysql: unspecified DoS related to XML (CPU April 2014)1088134 – CVE-2014-2419 mysql: unspecified DoS related to Partition (CPU April 2014)1088143 – CVE-2014-2430 mysql: unspecified DoS related to Performance Schema (CPU April 2014)1088146 – CVE-2014-2431 mysql: unspecified DoS related to Options (CPU April 2014)1088179 – CVE-2014-2432 mysql: unspecified DoS related to Federated (CPU April 2014)1088190 – CVE-2014-2436 mysql: unspecified vulnerability related to RBR (CPU April 2014)1088191 – CVE-2014-2438 mysql: unspecified DoS related to Replication (CPU April 2014)1088197 – CVE-2014-2440 mysql: unspecified vulnerability related to Client (CPU April 2014)

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply