- Issued:
- 2016-10-13
- Updated:
- 2016-10-13
RHSA-2016:2062 - Security Advisory
Synopsis
Important: mariadb-galera security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for mariadb-galera is now available for Red Hat OpenStack Platform 9.0 (Mitaka).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Galera is a synchronous multi-master cluster for MariaDB.
Security Fix(es):
- A permissions flaw was discovered in the MySQL logging functionality, which allowed writing to MySQL configuration files. An administrative database user, or a database user with FILE privileges, could possibly exploit this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically.
Affected Products
- Red Hat OpenStack 9 x86_64
Fixes
- BZ - 1375198 - CVE-2016-6662 mysql: general_log can write to configuration files, leading to privilege escalation
CVEs
Red Hat OpenStack 9
SRPM | |
---|---|
mariadb-galera-5.5.42-5.el7ost.src.rpm | SHA-256: 1cc952930cbe47bbaa80b2dd1ce471f065ac3bda9650301dc695aed317e24700 |
x86_64 | |
mariadb-galera-common-5.5.42-5.el7ost.x86_64.rpm | SHA-256: 1cf3bcdcac0219cc53a2db1e19376f24af7f29c5ba01bb3a172b73789e84c9d6 |
mariadb-galera-debuginfo-5.5.42-5.el7ost.x86_64.rpm | SHA-256: 5c9ad9a92e3c111f58d4daccc835ad06fdf5f86266f095ef2f08d1c458eb8493 |
mariadb-galera-server-5.5.42-5.el7ost.x86_64.rpm | SHA-256: 5502c246ec3c38411eebfa2b151cedf94f307e3bd8ac325db348721f936ac288 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.