RLSA-2022:5826

Source
https://errata.rockylinux.org/RLSA-2022:5826
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2022:5826.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2022:5826
Related
Published
2022-08-02T07:05:52Z
Modified
2023-02-02T13:45:33.224307Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Moderate: mariadb:10.5 security, bug fix, and enhancement update
Details

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16).

Security Fix(es):

  • mariadb: MariaDB through 10.5.9 allows attackers to trigger a convertconstto_int use-after-free when the BIGINT data type is used (CVE-2021-46669)

  • mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)

  • mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)

  • mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)

  • mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)

  • mariadb: assertion failure in Itemargs::walkarg (CVE-2022-27376)

  • mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)

  • mariadb: crash in createtmptable::finalize (CVE-2022-27378)

  • mariadb: crash in component argcomparator::comparereal_fixed (CVE-2022-27379)

  • mariadb: crash at my_decimal::operator= (CVE-2022-27380)

  • mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)

  • mariadb: assertion failure via component Itemfield::usedtables/updatedependmapfororder (CVE-2022-27382)

  • mariadb: use-after-poison in mystrcasecmp8bit() of ctype-simple.c (CVE-2022-27383)

  • mariadb: via component Itemsubselect::initexprcachetracker (CVE-2022-27384)

  • mariadb: crash in queryarena::setquery_arena upon SELECT from view (CVE-2022-27386)

  • mariadb: assertion failures in decimalbinsize (CVE-2022-27387)

  • mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)

  • mariadb: assertion failure in compareorderelements (CVE-2022-27445)

  • mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)

  • mariadb: use-after-poison in Binarystring::freebuffer (CVE-2022-27447)

  • mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)

  • mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)

  • mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)

  • mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)

  • mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)

  • mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)

  • mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457)

  • mariadb: use-after-poison in Binarystring::freebuffer (CVE-2022-27458)

  • mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)

  • mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)

  • mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)

  • mariadb: MariaDB allows an application crash in findfieldintables and findorderinlist via an unused common table expression (CTE) (CVE-2021-46661)

  • mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)

  • mariadb: crash in subselectpostjoin_aggr for a NULL value of aggr (CVE-2021-46664)

  • mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665)

  • mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Don't use less parallelism if not necessary (BZ#2096934)

  • Links in galera package description are bad (BZ#2096935)

  • [Tracker] Rebase to Galera 26.4.11 (BZ#2096936)

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / galera

Package

Name
galera
Purl
pkg:rpm/rocky-linux/galera?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:26.4.11-1.module+el8.6.0+995+5ac2a483

Rocky Linux:8 / Judy

Package

Name
Judy
Purl
pkg:rpm/rocky-linux/Judy?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:1.0.5-18.module+el8.4.0+427+adf35707

Rocky Linux:8 / mariadb

Package

Name
mariadb
Purl
pkg:rpm/rocky-linux/mariadb?distro=rocky-linux-8&epoch=3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:10.5.16-2.module+el8.6.0+995+5ac2a483