Lucene search

K
redhatRedHatRHSA-2023:7633
HistoryDec 04, 2023 - 9:44 a.m.

(RHSA-2023:7633) Important: rh-mariadb105-galera and rh-mariadb105-mariadb security update

2023-12-0409:44:35
access.redhat.com
8
security update
mariadb
cve-2023-5157
cve-2022-32081
cve-2022-32082
cve-2022-32084
cve-2022-32089
cve-2022-32091
cve-2022-38791
cve-2022-47015
bz#2114888
bz#2173013
bz#2240558

7.8 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

67.8%

MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL.

The following packages have been upgraded to a later upstream version: rh-mariadb105-galera (26.4.14), rh-mariadb105-mariadb (10.5.22). (BZ#2114888, BZ#2173013, BZ#2240558)

Security Fix(es):

  • mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6 (CVE-2023-5157)

  • mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc (CVE-2022-32081)

  • mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc (CVE-2022-32082)

  • mariadb: segmentation fault via the component sub_select (CVE-2022-32084)

  • mariadb: server crash in st_select_lex_unit::exclude_level (CVE-2022-32089)

  • mariadb: server crash in JOIN_CACHE::free or in copy_fields (CVE-2022-32091)

  • mariadb: compress_write() fails to release mutex on failure (CVE-2022-38791)

  • mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() (CVE-2022-47015)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.