[ALSA-2022:6443] mariadb:10.3 security and bug fix update
Severity
Moderate
Affected Packages
30
CVEs
35
mariadb:10.3 security and bug fix update
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35).
Security Fix(es):
- mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
- mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
- mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
- mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
- mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
- mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052)
- mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
- mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
- mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
- mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
- mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
- mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
- mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
- mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
- mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
- mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
- mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
- mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
- mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
- mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
- mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
- mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
- mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
- mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
- mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
- mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083)
- mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085)
- mariadb: server crash in Item_args::walk_args (CVE-2022-32087)
- mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088)
- mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
- mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
- mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
- mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
- mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
- mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075)
- ID
- ALSA-2022:6443
- Severity
- moderate
- URL
- https://errata.almalinux.org/ALSA-2022:6443.html
- Published
-
2022-09-13T00:00:00
(2 years ago) - Modified
-
2022-10-14T07:41:44
(23 months ago) - Rights
- Copyright 2022 AlmaLinux OS
- Other Advisories
-
- ALAS2-2023-2057
- ALPINE:CVE-2021-46659
- ALPINE:CVE-2021-46661
- ALPINE:CVE-2021-46663
- ALPINE:CVE-2021-46664
- ALPINE:CVE-2021-46665
- ALPINE:CVE-2021-46668
- ALPINE:CVE-2022-21427
- ALPINE:CVE-2022-24048
- ALPINE:CVE-2022-24050
- ALPINE:CVE-2022-24051
- ALPINE:CVE-2022-24052
- ALPINE:CVE-2022-27376
- ALPINE:CVE-2022-27377
- ALPINE:CVE-2022-27378
- ALPINE:CVE-2022-27379
- ALPINE:CVE-2022-27380
- ALPINE:CVE-2022-27381
- ALPINE:CVE-2022-27383
- ALPINE:CVE-2022-27384
- ALPINE:CVE-2022-27386
- ALPINE:CVE-2022-27387
- ALPINE:CVE-2022-27445
- ALPINE:CVE-2022-27447
- ALPINE:CVE-2022-27448
- ALPINE:CVE-2022-27449
- ALPINE:CVE-2022-27452
- ALPINE:CVE-2022-27456
- ALPINE:CVE-2022-27458
- ALPINE:CVE-2022-31622
- ALPINE:CVE-2022-31623
- ALSA-2022:5826
- ALSA-2022:5948
- ALSA-2022:6590
- ALSA-2022:7119
- ELSA-2022-5826
- ELSA-2022-5948
- ELSA-2022-6443
- ELSA-2022-6590
- ELSA-2022-7119
- FEDORA-2022-03350936ee
- FEDORA-2022-25dcba7104
- FEDORA-2022-263f7cc483
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-e6dc7ed871
- FREEBSD:04FECC47-DAD2-11EC-8FBD-D4C9EF517024
- FREEBSD:27BF9378-8FFD-11EC-8BE6-D4C9EF517024
- FREEBSD:ADD683BE-BD76-11EC-A06F-D4C9EF517024
- FREEBSD:FF5606F7-8A45-11EC-8BE6-D4C9EF517024
- GLSA-202405-25
- MS:CVE-2021-46659
- MS:CVE-2021-46661
- MS:CVE-2021-46663
- MS:CVE-2021-46664
- MS:CVE-2021-46665
- MS:CVE-2021-46668
- MS:CVE-2021-46669
- MS:CVE-2022-21427
- MS:CVE-2022-27376
- MS:CVE-2022-27377
- MS:CVE-2022-27378
- MS:CVE-2022-27379
- MS:CVE-2022-27380
- MS:CVE-2022-27381
- MS:CVE-2022-27383
- MS:CVE-2022-27384
- MS:CVE-2022-27386
- MS:CVE-2022-27387
- MS:CVE-2022-27445
- MS:CVE-2022-27447
- MS:CVE-2022-27448
- MS:CVE-2022-27449
- MS:CVE-2022-27452
- MS:CVE-2022-27456
- MS:CVE-2022-27458
- MS:CVE-2022-31622
- MS:CVE-2022-31623
- openSUSE-SU-2022:0731-1
- RHSA-2022:5826
- RHSA-2022:5948
- RHSA-2022:6443
- RHSA-2022:6590
- RHSA-2022:7119
- RLSA-2022:5826
- RLSA-2022:5948
- RLSA-2022:6443
- RLSA-2022:6590
- RLSA-2022:7119
- SSA:2022-044-01
- SSA:2022-141-01
- SUSE-SU-2022:0725-1
- SUSE-SU-2022:0726-1
- SUSE-SU-2022:0731-1
- SUSE-SU-2022:0731-2
- SUSE-SU-2022:0782-1
- SUSE-SU-2022:2003-1
- SUSE-SU-2022:2107-1
- SUSE-SU-2022:2160-1
- SUSE-SU-2022:2189-1
- SUSE-SU-2022:2561-1
- SUSE-SU-2022:3159-1
- SUSE-SU-2022:3225-1
- SUSE-SU-2022:3391-1
- USN-5305-1
- USN-5400-1
- USN-5400-2
- USN-5739-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/almalinux/mariadb?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-test?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-test | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-test?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-test | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-server?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-server | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-server?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-server | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-server-utils?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-server-utils | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-server-utils?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-server-utils | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-server-galera?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-server-galera | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-server-galera?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-server-galera | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-oqgraph-engine?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-oqgraph-engine | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-oqgraph-engine?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-oqgraph-engine | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-gssapi-server?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-gssapi-server | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-gssapi-server?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-gssapi-server | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-errmsg?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-errmsg | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-errmsg?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-errmsg | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-embedded?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-embedded | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-embedded?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-embedded | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-embedded-devel?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-embedded-devel | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-embedded-devel?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-embedded-devel | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-devel?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-devel | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-devel?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-devel | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-common?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-common | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-common?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-common | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/mariadb-backup?arch=x86_64&distro=almalinux-8.6 | almalinux | mariadb-backup | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/mariadb-backup?arch=aarch64&distro=almalinux-8.6 | almalinux | mariadb-backup | < 10.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/Judy?arch=x86_64&distro=almalinux-8.6 | almalinux | Judy | < 1.0.5-18.module_el8.6.0+3072+3c630e87 | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/Judy?arch=aarch64&distro=almalinux-8.6 | almalinux | Judy | < 1.0.5-18.module_el8.6.0+3072+3c630e87 | almalinux-8.6 | aarch64 | |
Affected | pkg:rpm/almalinux/galera?arch=x86_64&distro=almalinux-8.6 | almalinux | galera | < 25.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | x86_64 | |
Affected | pkg:rpm/almalinux/galera?arch=aarch64&distro=almalinux-8.6 | almalinux | galera | < 25.3.35-1.module_el8.6.0+3265+230ed96b | almalinux-8.6 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |