Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Step:15-SP1
patchinfo.29321
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.29321
<patchinfo incident="29321"> <issue tracker="jsc" id="SLE-8269"/> <issue tracker="jsc" id="SLE-12253"/> <issue tracker="jsc" id="PED-2455"/> <issue tracker="cve" id="2018-2668"/> <issue tracker="cve" id="2021-46658"/> <issue tracker="cve" id="2016-0606"/> <issue tracker="cve" id="2019-2628"/> <issue tracker="cve" id="2018-3060"/> <issue tracker="cve" id="2016-5629"/> <issue tracker="cve" id="2018-2767"/> <issue tracker="cve" id="2018-2810"/> <issue tracker="cve" id="2017-10379"/> <issue tracker="cve" id="2015-4836"/> <issue tracker="cve" id="2022-32088"/> <issue tracker="cve" id="2016-0598"/> <issue tracker="cve" id="2012-5612"/> <issue tracker="cve" id="2012-4414"/> <issue tracker="cve" id="2017-3265"/> <issue tracker="cve" id="2017-3464"/> <issue tracker="cve" id="2017-3317"/> <issue tracker="cve" id="2020-14776"/> <issue tracker="cve" id="2017-3244"/> <issue tracker="cve" id="2017-15365"/> <issue tracker="cve" id="2022-47015"/> <issue tracker="cve" id="2009-4030"/> <issue tracker="cve" id="2020-2574"/> <issue tracker="cve" id="2017-3238"/> <issue tracker="cve" id="2015-4864"/> <issue tracker="cve" id="2021-2372"/> <issue tracker="cve" id="2019-2537"/> <issue tracker="cve" id="2017-3291"/> <issue tracker="cve" id="2022-27384"/> <issue tracker="cve" id="2018-2612"/> <issue tracker="cve" id="2018-2640"/> <issue tracker="cve" id="2021-46659"/> <issue tracker="cve" id="2018-3200"/> <issue tracker="cve" id="2018-2771"/> <issue tracker="cve" id="2021-46669"/> <issue tracker="cve" id="2018-2787"/> <issue tracker="cve" id="2018-2766"/> <issue tracker="cve" id="2019-2938"/> <issue tracker="cve" id="2018-2622"/> <issue tracker="cve" id="2015-4815"/> <issue tracker="cve" id="2020-2752"/> <issue tracker="cve" id="2019-2740"/> <issue tracker="cve" id="2022-27452"/> <issue tracker="cve" id="2022-32085"/> <issue tracker="cve" id="2017-3312"/> <issue tracker="cve" id="2015-4895"/> <issue tracker="cve" id="2015-4816"/> <issue tracker="cve" id="2020-13249"/> <issue tracker="cve" id="2022-27387"/> <issue tracker="cve" id="2018-2665"/> <issue tracker="cve" id="2012-5615"/> <issue tracker="cve" id="2016-0668"/> <issue tracker="cve" id="2019-2627"/> <issue tracker="cve" id="2018-2784"/> <issue tracker="cve" id="2019-2737"/> <issue tracker="cve" id="2017-10384"/> <issue tracker="cve" id="2016-7440"/> <issue tracker="cve" id="2017-3636"/> <issue tracker="cve" id="2017-10320"/> <issue tracker="cve" id="2021-46665"/> <issue tracker="cve" id="2013-1976"/> <issue tracker="cve" id="2016-0651"/> <issue tracker="cve" id="2022-27381"/> <issue tracker="cve" id="2006-0903"/> <issue tracker="cve" id="2016-6662"/> <issue tracker="cve" id="2021-2389"/> <issue tracker="cve" id="2018-3064"/> <issue tracker="cve" id="2022-27444"/> <issue tracker="cve" id="2022-27455"/> <issue tracker="cve" id="2016-5440"/> <issue tracker="cve" id="2016-5616"/> <issue tracker="cve" id="2012-5611"/> <issue tracker="cve" id="2018-2759"/> <issue tracker="cve" id="2022-27382"/> <issue tracker="cve" id="2018-3282"/> <issue tracker="cve" id="2018-3162"/> <issue tracker="cve" id="2022-32081"/> <issue tracker="cve" id="2019-2758"/> <issue tracker="cve" id="2016-0505"/> <issue tracker="cve" id="2015-4913"/> <issue tracker="cve" id="2017-3258"/> <issue tracker="cve" id="2017-3308"/> <issue tracker="cve" id="2022-27448"/> <issue tracker="cve" id="2016-5626"/> <issue tracker="cve" id="2008-7247"/> <issue tracker="cve" id="2022-32084"/> <issue tracker="cve" id="2018-2782"/> <issue tracker="cve" id="2016-3477"/> <issue tracker="cve" id="2016-0597"/> <issue tracker="cve" id="2016-3492"/> <issue tracker="cve" id="2016-9843"/> <issue tracker="cve" id="2019-18901"/> <issue tracker="cve" id="2017-3318"/> <issue tracker="cve" id="2022-24050"/> <issue tracker="cve" id="2016-0616"/> <issue tracker="cve" id="2021-35604"/> <issue tracker="cve" id="2015-4858"/> <issue tracker="cve" id="2019-2974"/> <issue tracker="cve" id="2016-6664"/> <issue tracker="cve" id="2022-27377"/> <issue tracker="cve" id="2016-3521"/> <issue tracker="cve" id="2016-2047"/> <issue tracker="cve" id="2022-27446"/> <issue tracker="cve" id="2018-3284"/> <issue tracker="cve" id="2022-24052"/> <issue tracker="cve" id="2016-3615"/> <issue tracker="cve" id="2020-14765"/> <issue tracker="cve" id="2022-27447"/> <issue tracker="cve" id="2022-27457"/> <issue tracker="cve" id="2017-3243"/> <issue tracker="cve" id="2017-3257"/> <issue tracker="cve" id="2015-4861"/> <issue tracker="cve" id="2022-27451"/> <issue tracker="cve" id="2019-2614"/> <issue tracker="cve" id="2015-4819"/> <issue tracker="cve" id="2022-27386"/> <issue tracker="cve" id="2018-3173"/> <issue tracker="cve" id="2009-4028"/> <issue tracker="cve" id="2007-6303"/> <issue tracker="cve" id="2022-27378"/> <issue tracker="cve" id="2018-3185"/> <issue tracker="cve" id="2020-15180"/> <issue tracker="cve" id="2018-3058"/> <issue tracker="cve" id="2018-3277"/> <issue tracker="cve" id="2009-4019"/> <issue tracker="cve" id="2017-3313"/> <issue tracker="cve" id="2006-4227"/> <issue tracker="cve" id="2022-27456"/> <issue tracker="cve" id="2022-27379"/> <issue tracker="cve" id="2018-3143"/> <issue tracker="cve" id="2018-2819"/> <issue tracker="cve" id="2022-27449"/> <issue tracker="cve" id="2017-10268"/> <issue tracker="cve" id="2016-5624"/> <issue tracker="cve" id="2018-3063"/> <issue tracker="cve" id="2015-4866"/> <issue tracker="cve" id="2016-0640"/> <issue tracker="cve" id="2012-5627"/> <issue tracker="cve" id="2022-27445"/> <issue tracker="cve" id="2017-3309"/> <issue tracker="cve" id="2018-2777"/> <issue tracker="cve" id="2017-3653"/> <issue tracker="cve" id="2016-0649"/> <issue tracker="cve" id="2022-27458"/> <issue tracker="cve" id="2016-0646"/> <issue tracker="cve" id="2022-24048"/> <issue tracker="cve" id="2015-4802"/> <issue tracker="cve" id="2016-0610"/> <issue tracker="cve" id="2018-2813"/> <issue tracker="cve" id="2018-2761"/> <issue tracker="cve" id="2018-3066"/> <issue tracker="cve" id="2018-2817"/> <issue tracker="cve" id="2015-4807"/> <issue tracker="cve" id="2007-5969"/> <issue tracker="cve" id="2015-4826"/> <issue tracker="cve" id="2018-3156"/> <issue tracker="cve" id="2017-10378"/> <issue tracker="cve" id="2022-32091"/> <issue tracker="cve" id="2020-2814"/> <issue tracker="cve" id="2016-0596"/> <issue tracker="cve" id="2016-0650"/> <issue tracker="cve" id="2016-0642"/> <issue tracker="cve" id="2016-0644"/> <issue tracker="cve" id="2018-2781"/> <issue tracker="cve" id="2021-2154"/> <issue tracker="cve" id="2022-21427"/> <issue tracker="cve" id="2018-3251"/> <issue tracker="cve" id="2018-2562"/> <issue tracker="cve" id="2015-7744"/> <issue tracker="cve" id="2015-4830"/> <issue tracker="cve" id="2006-4226"/> <issue tracker="cve" id="2022-32089"/> <issue tracker="cve" id="2022-32083"/> <issue tracker="cve" id="2021-46663"/> <issue tracker="cve" id="2016-0600"/> <issue tracker="cve" id="2022-38791"/> <issue tracker="cve" id="2016-0608"/> <issue tracker="cve" id="2016-8283"/> <issue tracker="cve" id="2018-2786"/> <issue tracker="cve" id="2021-46661"/> <issue tracker="cve" id="2022-24051"/> <issue tracker="cve" id="2017-3456"/> <issue tracker="cve" id="2021-46664"/> <issue tracker="cve" id="2015-5969"/> <issue tracker="cve" id="2017-10365"/> <issue tracker="cve" id="2016-0641"/> <issue tracker="cve" id="2016-0546"/> <issue tracker="cve" id="2008-2079"/> <issue tracker="cve" id="2015-4879"/> <issue tracker="cve" id="2019-2510"/> <issue tracker="cve" id="2022-32086"/> <issue tracker="cve" id="2015-4870"/> <issue tracker="cve" id="2007-5970"/> <issue tracker="cve" id="2016-5584"/> <issue tracker="cve" id="2022-27376"/> <issue tracker="cve" id="2020-7221"/> <issue tracker="cve" id="2020-14789"/> <issue tracker="cve" id="2022-21595"/> <issue tracker="cve" id="2019-2739"/> <issue tracker="cve" id="2018-3174"/> <issue tracker="cve" id="2016-0609"/> <issue tracker="cve" id="2007-6304"/> <issue tracker="cve" id="2015-4792"/> <issue tracker="cve" id="2020-2812"/> <issue tracker="cve" id="2022-27383"/> <issue tracker="cve" id="2021-2166"/> <issue tracker="cve" id="2022-27380"/> <issue tracker="cve" id="2018-2755"/> <issue tracker="cve" id="2021-46668"/> <issue tracker="cve" id="2020-2760"/> <issue tracker="cve" id="2017-3641"/> <issue tracker="cve" id="2016-6663"/> <issue tracker="cve" id="2017-3302"/> <issue tracker="cve" id="2018-25032"/> <issue tracker="cve" id="2021-46657"/> <issue tracker="cve" id="2021-27928"/> <issue tracker="cve" id="2017-3453"/> <issue tracker="cve" id="2020-14812"/> <issue tracker="cve" id="2022-32087"/> <issue tracker="cve" id="2017-10286"/> <issue tracker="cve" id="2019-2805"/> <issue tracker="bnc" id="1198640">VUL-0: CVE-2022-27452: mariadb,mariadb-100: MariaDB: a segmentation fault in sql/item_cmpfunc.cc</issue> <issue tracker="bnc" id="859345">mysql crash with alternative cnf files (my-huge.cnf, my-large.cnf ...)</issue> <issue tracker="bnc" id="1198638">VUL-0: CVE-2022-27455: mariadb,mariadb-100: MariaDB: Use-After-Free in strings/ctype-simple.c</issue> <issue tracker="bnc" id="763150">Last update of mysql broke logrotate</issue> <issue tracker="bnc" id="1005581">VUL-0: CVE-2016-7440: mysql: Unspecified vulnerability in subcomponent Encryption</issue> <issue tracker="bnc" id="1069401">Database failed apply with mariadb 10.2 : RuntimeError: Galera cluster did not start after 600 seconds</issue> <issue tracker="bnc" id="894479">Mariadb url point to a strange website</issue> <issue tracker="bnc" id="1197459">VUL-0: CVE-2018-25032: zlib: memory corruption on deflate (i.e. compress)</issue> <issue tracker="bnc" id="1092544">GCC 8: mariadb test fails</issue> <issue tracker="bnc" id="1182218">mariadb: %_rpmmacrodir is owned by mariadb</issue> <issue tracker="bnc" id="1111859">Maria DB testsuite - test main.plugin_auth failed</issue> <issue tracker="bnc" id="1160868">VUL-0: CVE-2020-7221: mariadb: auth_pam_tool runtime permission setting allows privilege escalation from mysql user to root</issue> <issue tracker="bnc" id="1201169">VUL-0: CVE-2022-32089: mariadb: segmentation fault via the component st_select_lex_unit:exclude_level</issue> <issue tracker="bnc" id="1005562">VUL-0: CVE-2016-5616: mysql: Unspecified vulnerability in subcomponent MyISAM</issue> <issue tracker="bnc" id="990890">mariadb - @sysconfdir@ variable is not expanded properly</issue> <issue tracker="bnc" id="1042632">Mariadb fails to build with openssl-1.1</issue> <issue tracker="bnc" id="1183770">VUL-0: CVE-2021-27928: mariadb: A remote code execution issue was discovered</issue> <issue tracker="bnc" id="1198639">VUL-0: CVE-2022-27451: mariadb,mariadb-100: segmentation fault in sql/field_conv.cc</issue> <issue tracker="bnc" id="1198634">VUL-0: CVE-2022-27444: mariadb-100,mariadb: Segmentation Fault in sql/item_subselect.cc</issue> <issue tracker="bnc" id="1112397">VUL-0: CVE-2018-3251: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="1088681">VUL-0: CVE-2018-2767: mariadb,mysql: Use of SSL/TLS not enforced in embedded server library (Return of BACKRONYM)</issue> <issue tracker="bnc" id="1047218">trackerbug: packages do not build reproducibly from including build time</issue> <issue tracker="bnc" id="1080891">server:database/mariadb: up-streaming patches</issue> <issue tracker="bnc" id="942908">systemd-tmpfiles: Two or more conflicting lines for /var/tmp/mysql.* configured, ignoring.</issue> <issue tracker="bnc" id="1068906">MariaDB: ALTER TABLE can't rename columns with CHECK constraints</issue> <issue tracker="bnc" id="332530">MySQL fails to reload after security update error from YOU</issue> <issue tracker="bnc" id="1198632">VUL-0: CVE-2022-27448: mariadb-100,mariadb: Assertation Failure in row/row0mysql.cc</issue> <issue tracker="bnc" id="1058729">MariaDB - mysql-test - connect.drop-open-error is failing (regression)</issue> <issue tracker="bnc" id="1185870">VUL-0: CVE-2021-2166: mysql,mariadb-100,mariadb: mysql: Server: DML unspecified vulnerability lead to complete DOS (CPU Apr 2021)</issue> <issue tracker="bnc" id="1198607">VUL-0: CVE-2022-27381: mariadb,mariadb-100: server crash at Field:set_default via specially crafted SQL statements.</issue> <issue tracker="bnc" id="914370">mariadb: rcmysql status shows "Something went wrong" after start or stop when everything was OK</issue> <issue tracker="bnc" id="1020890">VUL-0: CVE-2017-3313: mariadb,mysql: unspecified vulnerability affecting the MyISAM component (CPU Jan 2017)</issue> <issue tracker="bnc" id="1182739">VUL-0: mariadb: Update to 10.2.37/10.4.18/10.5.9</issue> <issue tracker="bnc" id="1177472">VUL-0: CVE-2020-15180: mariadb: update to 10.2.34 / 10.4.15</issue> <issue tracker="bnc" id="366820">mysql_upgrade file conflicts with official MySQL RPMs</issue> <issue tracker="bnc" id="1083087">Galera bootstrap failes work after MariaDB 10.2.13 upgrade</issue> <issue tracker="bnc" id="841709">mariadb 5.5.32 update is broken</issue> <issue tracker="bnc" id="979524">server:database/mariadb: why handlersocket plugin is removed?</issue> <issue tracker="bnc" id="1122198">VUL-0: mysql: Tracker bug for Oracle Critical Patch Update Advisory - January 2019</issue> <issue tracker="bnc" id="1116686">VUL-0: mariadb: 10.2.19,10.0.35 security release, mariadb-c-connector: 3.0.7 release</issue> <issue tracker="bnc" id="1198604">VUL-0: CVE-2022-27378: mariadb,mariadb-100: server crash in Create_tmp_table:finalize</issue> <issue tracker="bnc" id="1160878">AUDIT-FIND: mariadb: SUSE systemd service unit is missing features that upstream uses</issue> <issue tracker="bnc" id="1012075">MariaDB Test Suite issue with test sys_vars.secure_file_priv.test</issue> <issue tracker="bnc" id="1055165">mariadb build with cassandra enabled</issue> <issue tracker="bnc" id="1170204">[Build 13.19] mariadb-client contains broken link /usr/bin/mariadb-client-test</issue> <issue tracker="bnc" id="1020882">VUL-0: CVE-2017-3238: mariadb,mysql: unspecified vulnerability affecting the Optimizer component (CPU Jan 2017)</issue> <issue tracker="bnc" id="1112421">VUL-0: CVE-2018-3143: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="1112384">VUL-0: CVE-2018-3185: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="1055268">MariaDB configurations are not overwritable</issue> <issue tracker="bnc" id="437293">obsolete -XXbit packages during system upgrade</issue> <issue tracker="bnc" id="989922">VUL-0: CVE-2016-3615: mysql: Unspecified vulnerability in subcomponent dml</issue> <issue tracker="bnc" id="986251">lost+found directory causes mysql_upgrade to fail</issue> <issue tracker="bnc" id="829430">[Crash] Libreoffice 4.0 stable: missing dependency libmysqlclient_r.so for libreoffice-base-drivers-mysql package</issue> <issue tracker="bnc" id="1173028">mariadb is not packaged properly according to systemd devs</issue> <issue tracker="bnc" id="1160883">AUDIT-FIND: mariadb: mysql-systemd-helper performs operations redundant to systemd-tmpfiles configuration</issue> <issue tracker="bnc" id="1058374">[mariadb my.cnf] Use "bind-address =" directive and SSL section settings in default my.cnf</issue> <issue tracker="bnc" id="1112377">VUL-0: CVE-2018-3284: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="1005582">VUL-0: CVE-2016-8283: mysql: Unspecified vulnerability in subcomponent Types</issue> <issue tracker="bnc" id="779476">VUL-0: mariadb/mysql: CVE-2012-4414: Multiple SQL injections in MySQL/MariaDB</issue> <issue tracker="bnc" id="1020896">VUL-0: CVE-2017-3318: mariadb,mysql: unspecified vulnerability affecting Error Handling (CPU Jan 2017)</issue> <issue tracker="bnc" id="1060110">The mariadb install script depends on hostname but does not require it</issue> <issue tracker="bnc" id="1174559">[Regression] SLES 15 SP2 - mariadb version 10.4.13 is crashing while creating tables for keystone database of powervc</issue> <issue tracker="bnc" id="1178428">VUL-0: CVE-2020-14812,CVE-2020-14765,CVE-2020-14776, CVE-2020-14789: mariadb: Update to 10.2.36/10.4.17</issue> <issue tracker="bnc" id="1201163">VUL-0: CVE-2022-32083: mariadb: segmentation fault via the component Item_subselect:init_expr_cache_tracker</issue> <issue tracker="bnc" id="1160912">VUL-0: mariadb: chmod in %post in user controlled directory</issue> <issue tracker="bnc" id="1186031">server:database/mariadb: feature request innodb lz4 support</issue> <issue tracker="bnc" id="1020894">VUL-0: CVE-2017-3317: mariadb,mysql: unspecified vulnerability affecting Logging (CPU Jan 2017)</issue> <issue tracker="bnc" id="1020878">VUL-0: CVE-2017-3257 mariadb,mysql: unspecified vulnerability affecting InnoDB (CPU Jan 2017)</issue> <issue tracker="bnc" id="1067443">incomplete revert of the mariadb service rename</issue> <issue tracker="bnc" id="463586">MySQL init script fails to find itsself</issue> <issue tracker="bnc" id="1111858">Maria DB testsuite - test encryption.second_plugin-12863 failed</issue> <issue tracker="bnc" id="796164">mysql server is build without support for async io (libaio)</issue> <issue tracker="bnc" id="1156669">VUL-0: mariadb: 10.2.26, 10.2.27, 10.2.28, 10.2.29 releases</issue> <issue tracker="bnc" id="1136035">VUL-0: mariadb: 10.2.24 security release</issue> <issue tracker="bnc" id="989913">VUL-0: CVE-2016-3477: mysql: Unspecified vulnerability in subcomponent parser</issue> <issue tracker="bnc" id="387746">VUL-0: CVE-2008-2079: mysql privilege check bypassing</issue> <issue tracker="bnc" id="989926">VUL-0: CVE-2016-5440: mysql: Unspecified vulnerability in subcomponent rbr</issue> <issue tracker="bnc" id="1198628">VUL-0: CVE-2022-27376: mariadb,mariadb-100: use-after-free in the component Item_args:walk_arg</issue> <issue tracker="bnc" id="1112432">VUL-0: CVE-2018-3282: mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="937754">libmysqlclient_r18 package seems to have configuration issues</issue> <issue tracker="bnc" id="1101677">VUL-0: CVE-2018-3063: mysql: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges).</issue> <issue tracker="bnc" id="1198635">VUL-0: CVE-2022-27456: mariadb,mariadb-100: Use-After-Free in sql/sql_type.cc</issue> <issue tracker="bnc" id="792444">VUL-0: CVE-2012-5611: mysql: stack-based buffer overflow</issue> <issue tracker="bnc" id="429618">MySQL: Cannot create system tables with localhost as hostname</issue> <issue tracker="bnc" id="1198609">VUL-0: CVE-2022-27382: mariadb,mariadb-100: SEGV via component Item_field:used_tables/update_depend_map_for_order or Assertion `fixed == 1'</issue> <issue tracker="bnc" id="1198611">VUL-0: CVE-2022-27384: mariadb,mariadb-100: crash via component Item_subselect:init_expr_cache_tracker</issue> <issue tracker="bnc" id="1020877">VUL-0: CVE-2017-3244: mariadb,mysql: unspecified vulnerability affecing the DML component (CPU Jan 2017)</issue> <issue tracker="bnc" id="1020873">VUL-0: CVE-2017-3312: mariadb,mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664</issue> <issue tracker="bnc" id="1112386">VUL-0: CVE-2018-3173: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="1201161">VUL-0: CVE-2022-32081: mariadb: use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc</issue> <issue tracker="bnc" id="1006539">mysql_install_db can't find data files</issue> <issue tracker="bnc" id="1062583">[TRACKER BUG] Stop using boost-devel</issue> <issue tracker="bnc" id="1118754">mariadb: PerconaFT is AGPL and should be removed from the package</issue> <issue tracker="bnc" id="420313">broken library list in mysql_config --libs output</issue> <issue tracker="bnc" id="1180014">openSUSE Leap 15.2 imposes unexpectedly low open files limit (1024) , causing MariaDB / MySQL to crash with errors: Too many open files</issue> <issue tracker="bnc" id="998309">VUL-0: CVE-2016-6662: mysql,mariadb: Remote Root Code Execution / Privilege Escalation</issue> <issue tracker="bnc" id="921955">mariadb package (mysql-devel) does not exist for 13.2 ports ppc</issue> <issue tracker="bnc" id="1019948">mariadb even tumbleweed version is super old.</issue> <issue tracker="bnc" id="520876">Update to mysql-5.1.35-34.1 fails to restart mysql</issue> <issue tracker="bnc" id="425079">VUL-0: MySQL incomplete fix for CVE-2008-2079</issue> <issue tracker="bnc" id="1198637">VUL-0: CVE-2022-27458: mariadb,mariadb-100: Use-After-Free in sql/sql_string.h</issue> <issue tracker="bnc" id="1005566">VUL-0: CVE-2016-5626: mysql: Unspecified vulnerability in subcomponent GIS</issue> <issue tracker="bnc" id="557669">VUL-0: mysql: version 5.0.88 fixes security bugs</issue> <issue tracker="bnc" id="1175596">VUL-0: mariadb: Update to 10.2.33/10.4.14</issue> <issue tracker="bnc" id="1202863">VUL-0: CVE-2022-38791: mariadb-100,mariadb: data_mutex not released in compress_write causing a deadlock</issue> <issue tracker="bnc" id="427384">mysql: missing support for FEDERATED storage engine</issue> <issue tracker="bnc" id="984858">mariadb failing test main.bootstrap</issue> <issue tracker="bnc" id="937787">MariaDB - mysql-test - main.bootstrap fails</issue> <issue tracker="bnc" id="1120041">Planned mariadb 10.2.19 update cause corruption on some alter table statements</issue> <issue tracker="bnc" id="1101678">VUL-0: CVE-2018-3066: mysql: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options).</issue> <issue tracker="bnc" id="1103342">VUL-0: CVE-2018-3064: mysql: InnoDB unspecified vulnerability (CPU Jul 2018)</issue> <issue tracker="bnc" id="1005558">VUL-0: CVE-2016-5584: mysql: Unspecified vulnerability in subcomponent Encryption</issue> <issue tracker="bnc" id="789263">openSUSE:12.2/mysql-community-server: Bug in init.d script cause logrotate failure</issue> <issue tracker="bnc" id="525325">[server:database/mysql] mysqlhotcopy locks failure; knwon bug w/ fix available</issue> <issue tracker="bnc" id="983938">`After=syslog.target` left-overs in several unit files</issue> <issue tracker="bnc" id="1201168">VUL-0: CVE-2022-32088: mariadb: segmentation fault via the component Exec_time_tracker:get_loops/Filesort_tracker:report_use/filesort</issue> <issue tracker="bnc" id="1160285">AUDIT-0: mariadb: auth_pam_tool needs SUID root</issue> <issue tracker="bnc" id="1041525">[snapshot 20170527 gcc7] MariaDB crashes often</issue> <issue tracker="bnc" id="1112391">VUL-0: CVE-2018-3277: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="1020976">mysql init script: add umask 077 to create files with correct permissions</issue> <issue tracker="bnc" id="1008253">VUL-0: CVE-2016-6664: mariadb,mysql: Root Privilege Escalation</issue> <issue tracker="bnc" id="1201167">VUL-0: CVE-2022-32087: mariadb: segmentation fault via the component Item_args:walk_args</issue> <issue tracker="bnc" id="1199928">VUL-0: mariadb,mariadb-100: Fixed multiple vulnerabilities</issue> <issue tracker="bnc" id="1112368">VUL-0: CVE-2018-3174: mysql: Client programs unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="1005564">VUL-0: CVE-2016-5624: mysql: Unspecified vulnerability in subcomponent DML</issue> <issue tracker="bnc" id="1198630">VUL-0: CVE-2022-27446: mariadb-100,mariadb: Segmentation Fault in sql/item_cmpfunc.h</issue> <issue tracker="bnc" id="934789">VUL-0: mariadb/mysql: Logjam Attack: mysql uses 512 bit dh groups in SSL</issue> <issue tracker="bnc" id="1132666">mariadb multiple instances fail to load</issue> <issue tracker="bnc" id="889126">MariaDB config files not seen by Unix non-root users. Permission Problem in Package</issue> <issue tracker="bnc" id="1160895">VUL-0: CVE-2019-18901: mariadb: mysql-systemd-helper: race condition with mysql_upgrade_info</issue> <issue tracker="bnc" id="1201166">VUL-0: CVE-2022-32086: mariadb: segmentation fault via the component Item_field:fix_outer_field</issue> <issue tracker="bnc" id="963810">FATE #319006 - mariadb - changes in logging</issue> <issue tracker="bnc" id="1198605">VUL-0: CVE-2022-27379: mariadb,mariadb-100: server crash in component Arg_comparator:compare_real_fixed</issue> <issue tracker="bnc" id="1192497">VUL-0: CVE-2021-35604: mysql,mariadb,mariadb-100: InnoDB allows high privileged attacker with network access via multiple protocols to compromise MySQL Server</issue> <issue tracker="bnc" id="1166781">mysql / mariadb database broken after update from 15.1 to 15.2 beta</issue> <issue tracker="bnc" id="1198610">VUL-0: CVE-2022-27383: mariadb,mariadb-100: use-after-free in my_strcasecmp_8bit() of ctype-simple.c</issue> <issue tracker="bnc" id="1185872">VUL-0: CVE-2021-2154: mysql,mariadb,mariadb-100: mysql: Server: DML unspecified vulnerability can lead to complete DOS (CPU Apr 2021)</issue> <issue tracker="bnc" id="1198606">VUL-0: CVE-2022-27380: mariadb,mariadb-100: server crash at my_decimal:operator=</issue> <issue tracker="bnc" id="1198633">VUL-0: CVE-2022-27449: mariadb-100,mariadb: Segmentation Fault in sql/item_func.cc</issue> <issue tracker="bnc" id="1127027">mysql_install_db fails because basedir is incorrect</issue> <issue tracker="bnc" id="1195325">VUL-1: CVE-2021-46657: mariadb-100,mariadb: get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY.</issue> <issue tracker="bnc" id="1201164">VUL-0: CVE-2022-32084: mariadb: segmentation fault via the component sub_select</issue> <issue tracker="bnc" id="1198629">VUL-0: CVE-2022-27445: mariadb-100,mariadb: Segmentation Fault in sql/sql_window.cc</issue> <issue tracker="bnc" id="1182255">MariaDB 10.4.17 crashes due to conflicting lock [ref:_00D1igLOd._5001iYK52Q:ref]</issue> <issue tracker="bnc" id="1112404">VUL-0: CVE-2018-3200: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="353120">multi mysql server support in rcmysql</issue> <issue tracker="bnc" id="1013882">VUL-0: CVE-2016-9843: zlib: Big-endian out-of-bounds pointer</issue> <issue tracker="bnc" id="1198631">VUL-0: CVE-2022-27447: mariadb-100,mariadb: Use-After-Free in sql/sql_string.h</issue> <issue tracker="bnc" id="1168380">mariadb: mysql_upgrade creating empty global_priv table</issue> <issue tracker="bnc" id="1198636">VUL-0: CVE-2022-27457: mariadb,mariadb-100: Use-After-Free in strings/ctype-latin1.c</issue> <issue tracker="bnc" id="1112415">VUL-0: CVE-2018-3162: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="937767">mysql-community-server-client: The mysql server keeps restarting every minute</issue> <issue tracker="bnc" id="1005569">VUL-0: CVE-2016-5629: mysql: Unspecified vulnerability in subcomponent Federated</issue> <issue tracker="bnc" id="1189320">VUL-0: mariadb: 10.2.40 and 10.4.21 release</issue> <issue tracker="bnc" id="1005555">VUL-0: CVE-2016-3492: mysql: Unspecified vulnerability in subcomponent Optimizer</issue> <issue tracker="bnc" id="1200105">/usr/lib/mysql/mysql-systemd-helper is unaware of custom group, therfore Operation not permitted for chown command</issue> <issue tracker="bnc" id="1098683">Broken dependency: libxml2-devel-2.9.7-lp150.1.7.x86_64 requires readline-devel, but this requirement cannot be provided not installable providers: readline-devel-7.0-lp150.7.8.x86_64[repo-oss]</issue> <issue tracker="bnc" id="1020885">VUL-0: CVE-2017-3265: mariadb,mysql: unsafe chmod/chown use in init script (CPU Jan 2017)</issue> <issue tracker="bnc" id="1022428">VUL-0: CVE-2017-3302: mariadb: Use after free in libmysqlclient.so</issue> <issue tracker="bnc" id="1112417">VUL-0: CVE-2018-3156: mysql: InnoDB unspecified vulnerability (CPU Oct 2018)</issue> <issue tracker="bnc" id="1195339">VUL-1: CVE-2021-46659: mariadb-100,mariadb: crash in st_select_lex::mark_as_dependent with VIEW, aggregate and subquery</issue> <issue tracker="bnc" id="902396">mariadb: shell client control sequences not working (xterm, kde konsole)</issue> <issue tracker="bnc" id="539243">MySQL changes</issue> <issue tracker="bnc" id="1201170">VUL-0: CVE-2022-32091: mariadb: use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc</issue> <issue tracker="bnc" id="1112767">MySQL logrotate not working</issue> <issue tracker="bnc" id="1173516">EMU: Regression : MariaDB crashes at db_sync from Keystone</issue> <issue tracker="bnc" id="1101676">VUL-0: CVE-2018-3058: mysql: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM).</issue> <issue tracker="bnc" id="539249">/etc/my.cnf is writeable for group mysql</issue> <issue tracker="bnc" id="525065">libqt4-sql-mysql-32bit-4.5.2-1.2.x86_64 requires libmysqlclient_r.so.16, but this requirement cannot be provided</issue> <issue tracker="bnc" id="1043328">Update mariadb in TW to 10.2 and drop comat with mysql</issue> <issue tracker="bnc" id="435519">Bash syntax errors appear in /etc/init.d/mysql</issue> <issue tracker="bnc" id="357634">MySQL README.SUSE is outdated</issue> <issue tracker="bnc" id="1201165">VUL-0: CVE-2022-32085: mariadb: segmentation fault via the component Item_func_in:cleanup/Item:cleanup_processor</issue> <issue tracker="bnc" id="1020875">VUL-0: CVE-2017-3258: mariadb,mysql: unspecified vulnerability in the DDL component (CPU Jan 2017)</issue> <issue tracker="bnc" id="1144314">suggestion to change default my.cnf (skip-networking, slow log, sql_mode as in MySQL, rocksdb.cnf)</issue> <issue tracker="bnc" id="1038740">mysql-community-server (5.6.36-24.3.3): Wrong permission on directory /var/run/mysql</issue> <issue tracker="bnc" id="1020884">VUL-0: CVE-2017-3291: mariadb,mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017)</issue> <issue tracker="bnc" id="635645">mysql init script fails to start when SELinux is enabled</issue> <issue tracker="bnc" id="943096">mariadb unclean shutdown</issue> <issue tracker="bnc" id="747811">mariadb: install-info: warning: no info dir entry in `/usr/share/info/mysql.info.gz'</issue> <issue tracker="bnc" id="1198613">VUL-0: CVE-2022-27387: mariadb,mariadb-100: global-buffer-overflow in decimal_bin_size of decimal.c</issue> <issue tracker="bnc" id="371000">mysqld_multi starts twice as many servers</issue> <issue tracker="bnc" id="1001367">VUL-0: CVE-2016-6663: mariadb,mysql: Privilege Escalation / Race Condition</issue> <issue tracker="bnc" id="1142909">mariadb depended from python2 and this depence not specify in spec-file.</issue> <issue tracker="bnc" id="359522">mysql restart broke with last update</issue> <issue tracker="bnc" id="1143215">mariadb 10.3.16 after any update Plugin 'ROCKSDB' registration as a STORAGE ENGINE failed</issue> <issue tracker="bnc" id="1041891">Make mariadb tests pass and exclude failures</issue> <issue tracker="bnc" id="1196016">VUL-0: mariadb: 10.4.23 and 10.4.24 releases</issue> <issue tracker="bnc" id="971456">mariadb installation error: Too many levels of symbolic links</issue> <issue tracker="bnc" id="1198612">VUL-0: CVE-2022-27386: mariadb,mariadb-100: SEGV via the component sql/sql_class.cc.</issue> <issue tracker="bnc" id="1122475">mariadb-test requires libmariadb_plugins</issue> <issue tracker="bnc" id="1195334">VUL-1: CVE-2021-46658: mariadb,mariadb-100: save_window_function_values allows an application crash because of incorrect handling of with_window_func=true for a subquery.</issue> <issue tracker="bnc" id="1039034">no ODBC support in MariaDB Server</issue> <issue tracker="bnc" id="1198603">VUL-0: CVE-2022-27377: mariadb,mariadb-100: use-after-free in the component Item_func_in:cleanup() of item_cmpfunc.h</issue> <issue tracker="bnc" id="989919">VUL-0: CVE-2016-3521: mysql: Unspecified vulnerability in subcomponent types</issue> <issue tracker="bnc" id="1020891">VUL-0: CVE-2017-3243: mariadb,mysql: unspecified vulnerability affecting the Charsets component (CPU Jan 2017)</issue> <issue tracker="bnc" id="957174">VUL-0: CVE-2015-5969: mariadb, mysql: Information leak via mysql-systemd-helper</issue> <issue tracker="fate" id="323756"/> <issue tracker="fate" id="324329"/> <issue tracker="fate" id="323738"/> <issue tracker="fate" id="323280"/> <packager>dspinella</packager> <rating>moderate</rating> <category>recommended</category> <summary>Recommended update for mariadb104</summary> <description>This update for mariadb104 fixes the following issues: - Implement version 10.4 of MariaDB (jsc#PED-2455): * It is possible to use more than one authentication plugin for each user account. * The root user account is being created with the ability to use two authentication plugins. * All user accounts, passwords, and global privileges are now stored in the mysql.global_priv table. * Is being supported for User Password Expiry, which is not active by default. * Faster privilege checks for MariaDB setups with many user accounts or many database grants. - Update mysql-systemd-helper to be aware of custom group (bsc#1200105) - MariaDB is now support lz4 compression for 'INNODB'. (bsc#1186031) - Add 'mysql-user.conf' file to enable systemd generating mysql user in containers. (bsc#1173028) - Fixes an issue when MariaDB is ignoring the value of the parameter 'open_files_limit' in the global variables. (bsc#1180014) </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor