{"schema_version": "1.3.1", "id": "RLSA-2022:5948", "modified": "2023-02-02T14:07:05.584603Z", "published": "2022-08-09T09:35:35Z", "related": ["CVE-2021-46659", "CVE-2021-46661", "CVE-2021-46663", "CVE-2021-46664", "CVE-2021-46665", "CVE-2021-46668", "CVE-2021-46669", "CVE-2022-21595", "CVE-2022-24048", "CVE-2022-24050", "CVE-2022-24051", "CVE-2022-24052", "CVE-2022-27376", "CVE-2022-27377", "CVE-2022-27378", "CVE-2022-27379", "CVE-2022-27380", "CVE-2022-27381", "CVE-2022-27382", "CVE-2022-27383", "CVE-2022-27384", "CVE-2022-27386", "CVE-2022-27387", "CVE-2022-27444", "CVE-2022-27445", "CVE-2022-27446", "CVE-2022-27447", "CVE-2022-27448", "CVE-2022-27449", "CVE-2022-27451", "CVE-2022-27452", "CVE-2022-27455", "CVE-2022-27456", "CVE-2022-27457", "CVE-2022-27458", "CVE-2022-31622", "CVE-2022-31623"], "summary": "Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update", "details": "MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. \n\nThe following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16), mysql-selinux (1.0.5).\n\nSecurity Fix(es):\n\n* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)\n\n* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)\n\n* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)\n\n* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)\n\n* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)\n\n* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)\n\n* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)\n\n* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)\n\n* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)\n\n* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)\n\n* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)\n\n* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)\n\n* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)\n\n* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)\n\n* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)\n\n* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)\n\n* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)\n\n* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)\n\n* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)\n\n* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)\n\n* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)\n\n* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)\n\n* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)\n\n* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)\n\n* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)\n\n* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)\n\n* mariadb: incorrect key in \"dup value\" error after long unique (CVE-2022-27457)\n\n* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)\n\n* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)\n\n* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)\n\n* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)\n\n* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)\n\n* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)\n\n* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)\n\n* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)\n\n* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "galera", "purl": "pkg:rpm/rocky-linux/galera?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:26.4.11-1.el9_0"}], "database_specific": {"yum_repository": "AppStream"}}]}, {"package": {"ecosystem": "Rocky Linux:9", "name": "mariadb", "purl": "pkg:rpm/rocky-linux/mariadb?distro=rocky-linux-9&epoch=3"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "3:10.5.16-2.el9_0"}], "database_specific": {"yum_repository": "AppStream"}}]}, {"package": {"ecosystem": "Rocky Linux:9", "name": "mysql-selinux", "purl": "pkg:rpm/rocky-linux/mysql-selinux?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:1.0.5-1.el9_0"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2022:5948"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049302"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050017"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050022"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050024"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050026"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050032"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050034"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068211"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068233"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068234"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069833"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074817"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074947"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074949"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074951"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074966"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074981"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074987"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074996"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074999"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075005"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075006"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075691"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075692"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075693"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075694"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075695"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075696"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075697"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075699"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075700"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075701"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076144"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076145"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092354"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092360"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096271"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096274"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096276"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096277"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}