- Issued:
- 2014-12-02
- Updated:
- 2014-12-02
RHSA-2014:1940 - Security Advisory
Synopsis
Important: mariadb-galera security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated mariadb-galera packages that fix multiple security issues are now
available for Red Hat Enterprise Linux OpenStack Platform 5.0 on Red Hat
Enterprise Linux 7.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Description
MariaDB is a multi-user, multi-threaded SQL database server that is binary
compatible with MySQL. Galera is a synchronous multi-master cluster for
MariaDB.
This update fixes several vulnerabilities in the MariaDB database server.
Information about these flaws can be found on the Oracle Critical Patch
Update Advisory page, listed in the References section. (CVE-2014-4274,
CVE-2014-4287, CVE-2014-6463, CVE-2014-6464, CVE-2014-6469, CVE-2014-6484,
CVE-2014-6505, CVE-2014-6507, CVE-2014-6520, CVE-2014-6530, CVE-2014-6551,
CVE-2014-6555, CVE-2014-6559, CVE-2012-5615, CVE-2014-4258, CVE-2014-4260,
CVE-2014-2494, CVE-2014-4207)
These updated packages upgrade MariaDB to version 5.5.40. Refer to the
MariaDB Release Notes listed in the References section for a complete list
of changes.
All mariadb-galera users are advised to upgrade to these updated packages,
which correct these issues. After installing this update, the MariaDB
server daemon (mysqld) will be restarted automatically.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat OpenStack 5.0 for RHEL 7 x86_64
Fixes
- BZ - RHSA-2014:1940 - CVE-2012-5615 mysql: Remote Preauth User Enumeration flaw
- BZ - RHSA-2014:1940 - CVE-2014-2494 mysql: unspecified vulnerability related to ENARC (CPU July 2014)
- BZ - RHSA-2014:1940 - CVE-2014-4207 mysql: unspecified vulnerability related to SROPTZR (CPU July 2014)
- BZ - RHSA-2014:1940 - CVE-2014-4258 mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014)
- BZ - RHSA-2014:1940 - CVE-2014-4260 mysql: unspecified vulnerability related to SRCHAR (CPU July 2014)
- BZ - RHSA-2014:1940 - CVE-2014-4274 mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20
- BZ - RHSA-2014:1940 - CVE-2014-4287 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6463 mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6464 mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6469 mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6484 mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6505 mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6507 mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6520 mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6530 mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6551 mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6555 mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014)
- BZ - RHSA-2014:1940 - CVE-2014-6559 mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014)
CVEs
Red Hat OpenStack 5.0 for RHEL 7
SRPM | |
---|---|
mariadb-galera-5.5.40-2.el7ost.src.rpm | SHA-256: 0dfeaa547eac3d648ddb6762c0c88e036b685a1873880827d5e46760849c413d |
x86_64 | |
mariadb-galera-common-5.5.40-2.el7ost.x86_64.rpm | SHA-256: 8d60fed925f9a304ff903ac0edf065a3a2abe7803d39d152c06f54568591c9d5 |
mariadb-galera-debuginfo-5.5.40-2.el7ost.x86_64.rpm | SHA-256: c3358276353604d0bfc70c8d261d94438b2c6d3b12cad181e2a0eb6139894f5f |
mariadb-galera-server-5.5.40-2.el7ost.x86_64.rpm | SHA-256: df92ee78049f622c120c1d0a92e191e89540f95e00751743191d0b0d43f7ea46 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.