rh-mariadb100-mariadb is vulnerable to arbitrary code execution attacks. The vulnerability exists as a heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P**c)(?P**a(?P=B)))>WGXCREDITS)/
, a different vulnerability than CVE-2015-8384.
www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixMSQL
www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixMSQL
access.redhat.com/errata/RHSA-2016:1132
access.redhat.com/security/cve/CVE-2016-3452
access.redhat.com/security/cve/CVE-2016-3459
access.redhat.com/security/cve/CVE-2016-3471
access.redhat.com/security/cve/CVE-2016-5444
access.redhat.com/security/updates/classification/#important
mariadb.com/kb/en/mariadb/mariadb-10021-release-notes/
mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/
mariadb.com/kb/en/mariadb/mariadb-10023-release-notes/
mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/