Lucene search

K
redhatRedHatRHSA-2022:1557
HistoryApr 26, 2022 - 1:50 p.m.

(RHSA-2022:1557) Moderate: mariadb:10.5 security, bug fix, and enhancement update

2022-04-2613:50:46
access.redhat.com
65
mariadb
10.5
security update
bug fix
multi-user
sql database
mysql
cve-2021-2154
cve-2021-2166
cve-2021-2372
cve-2021-2389
cve-2021-35604
cve-2021-46667
cve-2021-46657
cve-2021-46658
cve-2021-46662
cve-2021-46666
bz#1981332
galera
26.4.9
user_map.conf
centos8 stream
wsrep_sst_rsync_tunnel
procps-ng package
unix

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.319

Percentile

97.0%

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546)

Security Fix(es):

  • mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)

  • mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)

  • mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)

  • mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)

  • mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)

  • mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)

  • mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)

  • mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)

  • mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)

  • mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)

  • mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515)

  • mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524)

  • Galera doesn’t work without ‘procps-ng’ package MariaDB-10.5 (BZ#2050542)

OSVersionArchitecturePackageVersionFilename
RedHatanyx86_64mariadb-common< 10.5.13-1.module+el8.5.0+14125+d11efe18mariadb-common-10.5.13-1.module+el8.5.0+14125+d11efe18.x86_64.rpm
RedHatanyx86_64mariadb-server-utils< 10.5.13-1.module+el8.5.0+14125+d11efe18mariadb-server-utils-10.5.13-1.module+el8.5.0+14125+d11efe18.x86_64.rpm
RedHatanyaarch64judy-debugsource< 1.0.5-18.module+el8.4.0+9031+9abc7af9Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.aarch64.rpm
RedHatanys390xmariadb-gssapi-server< 10.5.13-1.module+el8.5.0+14125+d11efe18mariadb-gssapi-server-10.5.13-1.module+el8.5.0+14125+d11efe18.s390x.rpm
RedHatanyppc64lejudy-debugsource< 1.0.5-18.module+el8.4.0+9031+9abc7af9Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm
RedHatanyx86_64mariadb-embedded-debuginfo< 10.5.13-1.module+el8.5.0+14125+d11efe18mariadb-embedded-debuginfo-10.5.13-1.module+el8.5.0+14125+d11efe18.x86_64.rpm
RedHatanys390xjudy-debugsource< 1.0.5-18.module+el8.4.0+9031+9abc7af9Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.s390x.rpm
RedHatanys390xmariadb-gssapi-server-debuginfo< 10.5.13-1.module+el8.5.0+14125+d11efe18mariadb-gssapi-server-debuginfo-10.5.13-1.module+el8.5.0+14125+d11efe18.s390x.rpm
RedHatanyaarch64galera-debugsource< 26.4.9-4.module+el8.5.0+14125+d11efe18galera-debugsource-26.4.9-4.module+el8.5.0+14125+d11efe18.aarch64.rpm
RedHatanyx86_64mariadb-gssapi-server< 10.5.13-1.module+el8.5.0+14125+d11efe18mariadb-gssapi-server-10.5.13-1.module+el8.5.0+14125+d11efe18.x86_64.rpm
Rows per page:
1-10 of 1201

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.319

Percentile

97.0%