Пакет mariadb: Информация

  • Default inline alert: Версия в репозитории: 10.6.17-alt1

Исходный пакет: mariadb
Версия: 10.4.20-alt1
Собран:  11 июля 2021 г. 23:13 в задании #278107
Категория: Базы данных
Сообщить об ошибке в пакете
Домашняя страница: http://mariadb.org/

Лицензия: GPLv2 with exceptions
О пакете: A very fast and reliable SQL database engine
Описание: 
MariaDB is a community developed branch of MySQL - a multi-user, multi-threaded
SQL database server. It is a client/server implementation consisting of
a server daemon (mysqld) and many different client programs and libraries.
The base package contains the standard MariaDB/MySQL client programs and
generic MySQL files.

Список rpm-пакетов, предоставляемых данным srpm-пакетом:
libmariadb-devel (x86_64, ppc64le, i586, armh, aarch64)
libmariadb-devel-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
libmariadb3 (x86_64, ppc64le, i586, armh, aarch64)
libmariadb3-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
libmariadbd-devel (x86_64, ppc64le, i586, armh, aarch64)
libmariadbd-devel-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
libmariadbd19 (x86_64, ppc64le, i586, armh, aarch64)
libmariadbd19-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb (x86_64, ppc64le, i586, armh, aarch64)
mariadb-backup (x86_64, ppc64le, i586, armh, aarch64)
mariadb-backup-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-bench (noarch)
mariadb-client (x86_64, ppc64le, i586, armh, aarch64)
mariadb-client-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-common (noarch)
mariadb-connect-engine (x86_64, ppc64le, i586, armh, aarch64)
mariadb-connect-engine-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-cracklib-password-check (x86_64, ppc64le, i586, armh, aarch64)
mariadb-cracklib-password-check-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-gssapi-server (x86_64, ppc64le, i586, armh, aarch64)
mariadb-gssapi-server-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-oqgraph-engine (x86_64, ppc64le, i586, aarch64)
mariadb-oqgraph-engine-debuginfo (x86_64, ppc64le, i586, aarch64)
mariadb-rocksdb-engine (x86_64, ppc64le, aarch64)
mariadb-rocksdb-engine-debuginfo (x86_64, ppc64le, aarch64)
mariadb-server (x86_64, ppc64le, i586, armh, aarch64)
mariadb-server-control (noarch)
mariadb-server-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-server-galera (x86_64, ppc64le, i586, aarch64)
mariadb-server-perl (noarch)
mariadb-sphinx-engine (x86_64, ppc64le, i586, armh, aarch64)
mariadb-sphinx-engine-debuginfo (x86_64, ppc64le, i586, armh, aarch64)

Сопровождающий: Alexey Shabalin


    1. libaio-devel
    2. libreadline-devel
    3. python3
    4. libcurl-devel
    5. libkrb5-devel
    6. libsnappy-devel
    7. libsphinxclient-devel
    8. libssl-devel
    9. libxml2-devel
    10. perl-DBI
    11. liblz4-devel
    12. liblzma-devel
    13. liblzo2-devel
    14. perl-GD
    15. libedit-devel
    16. perl-Memoize
    17. libevent-devel
    18. perl-devel
    19. perl-threads
    20. sphinx
    21. rpm-build-python3
    22. bison
    23. groff-base
    24. groff-ps
    25. libncursesw-devel
    26. boost-devel
    27. libzstd-devel
    28. dos2unix
    29. doxygen
    30. libnuma-devel
    31. bzlib-devel
    32. libsystemd-devel
    33. libpam-devel
    34. checkpolicy
    35. chrooted
    36. libpcre-devel >= 8.35
    37. xsltproc
    38. xml-utils
    39. cmake
    40. policycoreutils
    41. zlib-devel
    42. control
    43. gcc-c++
    44. cracklib-devel
    45. cracklib-words
    46. ctest
    47. libjudy-devel
    48. libjemalloc-devel

Последнее изменение


11 июля 2021 г. Alexey Shabalin 10.4.20-alt1
- 10.4.20 (ALT #40403)
- Fixes for the following security vulnerabilities:
  + CVE-2021-27928
  + CVE-2021-2166
  + CVE-2021-2154
20 мая 2021 г. Slava Aseev 10.4.17-alt2
- fix FTBFS due to missing rpm-build-python
12 ноября 2020 г. Alexey Shabalin 10.4.17-alt1
- 10.4.17
- backport fix for MDEV-24096, MDEV-24121, MDEV-24134
- Fixes for the following security vulnerabilities:
  + CVE-2020-14812
  + CVE-2020-14765
  + CVE-2020-14776
  + CVE-2020-14789
  + CVE-2020-15180