rh-mariadb100-mariadb is vulnerable to arbitrary code execution. The vulnerability exists as the compile_branch function in pcre_compile.c mishandles patterns containing an (*ACCEPT)
substring.
rhn.redhat.com/errata/RHSA-2016-1025.html
vcs.pcre.org/pcre2?view=revision&revision=489
vcs.pcre.org/pcre?view=revision&revision=1631
www-01.ibm.com/support/docview.wss?uid=isg3T1023886
www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL
www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixMSQL
www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixMSQL
www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
www.securityfocus.com/bid/84810
access.redhat.com/errata/RHSA-2016:1132
access.redhat.com/security/cve/CVE-2016-3452
access.redhat.com/security/cve/CVE-2016-3459
access.redhat.com/security/cve/CVE-2016-3471
access.redhat.com/security/cve/CVE-2016-5444
access.redhat.com/security/updates/classification/#important
bto.bluecoat.com/security-advisory/sa128
bugs.debian.org/815920
bugs.debian.org/815921
bugs.exim.org/show_bug.cgi?id=1791
bugzilla.redhat.com/show_bug.cgi?id=1311503
mariadb.com/kb/en/mariadb/mariadb-10021-release-notes/
mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/
mariadb.com/kb/en/mariadb/mariadb-10023-release-notes/
mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
www.tenable.com/security/tns-2016-18