Пакет mariadb: Информация

  • Default inline alert: Версия в репозитории: 10.6.15-alt1

Исходный пакет: mariadb
Версия: 10.4.20-alt1
Собран:  13 июля 2021 г. 20:10 в задании #278144
Категория: Базы данных
Сообщить об ошибке в пакете
Домашняя страница: http://mariadb.org/

Лицензия: GPLv2 with exceptions
О пакете: A very fast and reliable SQL database engine
Описание: 
MariaDB is a community developed branch of MySQL - a multi-user, multi-threaded
SQL database server. It is a client/server implementation consisting of
a server daemon (mysqld) and many different client programs and libraries.
The base package contains the standard MariaDB/MySQL client programs and
generic MySQL files.

Список rpm-пакетов, предоставляемых данным srpm-пакетом:
libmariadb-devel (x86_64, ppc64le, i586, armh, aarch64)
libmariadb-devel-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
libmariadb3 (x86_64, ppc64le, i586, armh, aarch64)
libmariadb3-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
libmariadbd-devel (x86_64, ppc64le, i586, armh, aarch64)
libmariadbd-devel-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
libmariadbd19 (x86_64, ppc64le, i586, armh, aarch64)
libmariadbd19-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb (x86_64, ppc64le, i586, armh, aarch64)
mariadb-backup (x86_64, ppc64le, i586, armh, aarch64)
mariadb-backup-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-bench (noarch)
mariadb-client (x86_64, ppc64le, i586, armh, aarch64)
mariadb-client-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-common (noarch)
mariadb-connect-engine (x86_64, ppc64le, i586, armh, aarch64)
mariadb-connect-engine-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-cracklib-password-check (x86_64, ppc64le, i586, armh, aarch64)
mariadb-cracklib-password-check-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-gssapi-server (x86_64, ppc64le, i586, armh, aarch64)
mariadb-gssapi-server-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-oqgraph-engine (x86_64, ppc64le, i586, aarch64)
mariadb-oqgraph-engine-debuginfo (x86_64, ppc64le, i586, aarch64)
mariadb-rocksdb-engine (x86_64, ppc64le, aarch64)
mariadb-rocksdb-engine-debuginfo (x86_64, ppc64le, aarch64)
mariadb-server (x86_64, ppc64le, i586, armh, aarch64)
mariadb-server-control (noarch)
mariadb-server-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
mariadb-server-galera (x86_64, ppc64le, i586, aarch64)
mariadb-server-perl (noarch)
mariadb-sphinx-engine (x86_64, ppc64le, i586, armh, aarch64)
mariadb-sphinx-engine-debuginfo (x86_64, ppc64le, i586, armh, aarch64)

Сопровождающий: Alexey Shabalin


    1. libcurl-devel
    2. libreadline-devel
    3. libkrb5-devel
    4. python3
    5. libxml2-devel
    6. libedit-devel
    7. libevent-devel
    8. perl-DBI
    9. perl-GD
    10. perl-Memoize
    11. liblz4-devel
    12. liblzma-devel
    13. perl-devel
    14. perl-threads
    15. liblzo2-devel
    16. libsnappy-devel
    17. bison
    18. boost-devel
    19. libsphinxclient-devel
    20. libssl-devel
    21. libzstd-devel
    22. bzlib-devel
    23. groff-base
    24. groff-ps
    25. libncursesw-devel
    26. checkpolicy
    27. chrooted
    28. policycoreutils
    29. sphinx
    30. cmake
    31. control
    32. libnuma-devel
    33. cracklib-devel
    34. cracklib-words
    35. ctest
    36. rpm-build-python3
    37. libpam-devel
    38. dos2unix
    39. doxygen
    40. libpcre-devel >= 8.35
    41. libaio-devel
    42. xml-utils
    43. xsltproc
    44. libjudy-devel
    45. zlib-devel
    46. libjemalloc-devel
    47. libsystemd-devel
    48. gcc-c++

Последнее изменение


11 июля 2021 г. Alexey Shabalin 10.4.20-alt1
- 10.4.20 (ALT #40403)
- Fixes for the following security vulnerabilities:
  + CVE-2021-27928
  + CVE-2021-2166
  + CVE-2021-2154
20 мая 2021 г. Slava Aseev 10.4.17-alt2
- fix FTBFS due to missing rpm-build-python
12 ноября 2020 г. Alexey Shabalin 10.4.17-alt1
- 10.4.17
- backport fix for MDEV-24096, MDEV-24121, MDEV-24134
- Fixes for the following security vulnerabilities:
  + CVE-2020-14812
  + CVE-2020-14765
  + CVE-2020-14776
  + CVE-2020-14789
  + CVE-2020-15180