{"id":"ALSA-2019:3708","summary":"Moderate: mariadb:10.3 security and bug fix update","details":"MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. \nThe following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358)\nSecurity Fix(es):\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)\n* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)\n* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614)\n* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627)\n* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)\n* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737)\n* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739)\n* mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740)\n* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)\n* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAdditional Changes:\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-01-30T01:22:45.896522Z","published":"2019-11-05T00:00:00Z","related":["CVE-2019-2510","CVE-2019-2537","CVE-2019-2614","CVE-2019-2627","CVE-2019-2628","CVE-2019-2737","CVE-2019-2739","CVE-2019-2740","CVE-2019-2758","CVE-2019-2805"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3708"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2510"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2537"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2614"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2627"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2628"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2737"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2739"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2740"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2758"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-2805"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-2922"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-2007"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1666751"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1666763"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1702969"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1702976"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1702977"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1731997"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1731999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1732000"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1732008"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1732025"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1835850"},{"type":"REPORT","url":"https://bugzilla.redhat.com/1922382"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2019-3708.html"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2510"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2537"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2614"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2627"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2628"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2737"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2739"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2740"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2758"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-2805"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2020-2922"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-2007"}],"affected":[{"package":{"name":"Judy","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/Judy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.5-18.module_el8.6.0+2867+72759d2f"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}},{"package":{"name":"Judy","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/Judy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.5-18.module_el8.3.0+2028+5e3224e9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}},{"package":{"name":"Judy","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/Judy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.5-18.module_el8.5.0+2632+14ced695"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}},{"package":{"name":"Judy","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/Judy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.5-18.module_el8.6.0+2761+593e5e59"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}},{"package":{"name":"Judy-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/Judy-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.5-18.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}},{"package":{"name":"Judy-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/Judy-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.5-18.module_el8.6.0+2867+72759d2f"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}},{"package":{"name":"Judy-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/Judy-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.5-18.module_el8.3.0+2028+5e3224e9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}},{"package":{"name":"asio-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/asio-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.8-7.module_el8.6.0+2867+72759d2f"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}},{"package":{"name":"asio-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/asio-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.8-7.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2019:3708.json"}}],"schema_version":"1.7.3"}