{"id":"ALSA-2022:5826","summary":"Moderate: mariadb:10.5 security, bug fix, and enhancement update","details":"MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.\nThe following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16).\nSecurity Fix(es):\n* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)\n* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)\n* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)\n* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)\n* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)\n* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)\n* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)\n* mariadb: crash in create_tmp_table::finalize (CVE-2022-27378)\n* mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)\n* mariadb: crash at my_decimal::operator= (CVE-2022-27380)\n* mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)\n* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)\n* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)\n* mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)\n* mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)\n* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)\n* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)\n* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)\n* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)\n* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)\n* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)\n* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)\n* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)\n* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)\n* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)\n* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)\n* mariadb: incorrect key in \"dup value\" error after long unique (CVE-2022-27457)\n* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)\n* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)\n* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)\n* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)\n* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)\n* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)\n* mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)\n* mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665)\n* mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nBug Fix(es):\n* Don't use less parallelism if not necessary (BZ#2096934)\n* Links in galera package description are bad (BZ#2096935)\n* [Tracker] Rebase to Galera 26.4.11 (BZ#2096936)","modified":"2026-02-04T03:18:24.761985Z","published":"2022-08-02T00:00:00Z","related":["CVE-2021-46659","CVE-2021-46661","CVE-2021-46663","CVE-2021-46664","CVE-2021-46665","CVE-2021-46668","CVE-2021-46669","CVE-2022-24048","CVE-2022-24050","CVE-2022-24051","CVE-2022-24052","CVE-2022-27376","CVE-2022-27377","CVE-2022-27378","CVE-2022-27379","CVE-2022-27380","CVE-2022-27381","CVE-2022-27382","CVE-2022-27383","CVE-2022-27384","CVE-2022-27386","CVE-2022-27387","CVE-2022-27444","CVE-2022-27445","CVE-2022-27446","CVE-2022-27447","CVE-2022-27448","CVE-2022-27449","CVE-2022-27451","CVE-2022-27452","CVE-2022-27455","CVE-2022-27456","CVE-2022-27457","CVE-2022-27458","CVE-2022-31622","CVE-2022-31623"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:5826"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46659"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46661"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46663"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46664"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46665"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46668"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46669"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24048"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24050"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24051"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24052"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27376"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27377"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27378"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27379"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27380"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27381"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27382"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27383"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27384"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27386"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27387"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27444"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27445"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27446"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27447"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27448"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27449"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27451"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27452"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27455"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27458"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31622"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2049302"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050017"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050032"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2050034"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2068211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2068233"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2068234"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2069833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074817"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074951"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074981"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074987"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074996"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2074999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075005"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075006"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075692"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075694"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075696"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075697"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075699"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2075701"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2076144"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2076145"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2092354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2092360"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2022-5826.html"}],"affected":[{"package":{"name":"Judy","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/Judy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.5-18.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"galera","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"26.4.11-1.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-backup","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-backup"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-common","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-embedded","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-embedded"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-embedded-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-embedded-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-errmsg","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-gssapi-server","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-gssapi-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-oqgraph-engine","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-oqgraph-engine"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-pam","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-pam"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-server","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-server-galera","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-server-galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-server-utils","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-server-utils"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}},{"package":{"name":"mariadb-test","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mariadb-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.module_el8.6.0+3072+3c630e87"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:5826.json"}}],"schema_version":"1.7.3"}