{"id":"RHSA-2022:5759","summary":"Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update","modified":"2026-03-23T04:46:18.740538Z","published":"2024-09-13T23:18:50Z","upstream":["CVE-2021-46659","CVE-2021-46661","CVE-2021-46663","CVE-2021-46664","CVE-2021-46665","CVE-2021-46668","CVE-2021-46669","CVE-2022-21595","CVE-2022-24048","CVE-2022-24050","CVE-2022-24051","CVE-2022-24052","CVE-2022-27376","CVE-2022-27377","CVE-2022-27378","CVE-2022-27379","CVE-2022-27380","CVE-2022-27381","CVE-2022-27382","CVE-2022-27383","CVE-2022-27384","CVE-2022-27386","CVE-2022-27387","CVE-2022-27444","CVE-2022-27445","CVE-2022-27446","CVE-2022-27447","CVE-2022-27448","CVE-2022-27449","CVE-2022-27451","CVE-2022-27452","CVE-2022-27455","CVE-2022-27456","CVE-2022-27457","CVE-2022-27458","CVE-2022-31622","CVE-2022-31623","CVE-2022-32083","CVE-2022-32085","CVE-2022-32086","CVE-2022-32087","CVE-2022-32088"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:5759"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049302"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050017"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050032"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050034"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068233"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068234"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074817"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074951"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074981"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074987"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074996"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075005"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075006"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075692"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075694"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075696"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075697"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075699"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075701"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2076144"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2076145"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092360"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2101776"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2101777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2101782"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2101783"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106008"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5759.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46659"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46659"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46659"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46661"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46661"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46661"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46663"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46663"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46664"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46664"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46665"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46665"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46665"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46668"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46668"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46669"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21595"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21595"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24048"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24048"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24050"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24050"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24050"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24051"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24051"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24051"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24052"},{"type":"ARTICLE","url":"https://mariadb.com/kb/en/security/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27376"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27376"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27376"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27377"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27377"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27377"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27378"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27378"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27378"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27379"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27379"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27379"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27380"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27380"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27380"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27381"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27381"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27381"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27382"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27382"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27382"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27383"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27383"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27383"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27384"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27384"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27384"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27386"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27386"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27386"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27387"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27387"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27387"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27444"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27444"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27444"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27445"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27445"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27445"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27446"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27446"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27446"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27447"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27447"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27447"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27448"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27448"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27449"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27449"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27449"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27451"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27451"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27451"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27452"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27452"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27452"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27455"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27455"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27457"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27457"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27458"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31622"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31622"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31622"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31623"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31623"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32083"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32083"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32083"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32085"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32085"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32085"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32086"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32086"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32086"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32087"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32087"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32087"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32088"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32088"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32088"}],"affected":[{"package":{"name":"rh-mariadb105-mariadb","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-backup","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-backup"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-backup-syspaths","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-backup-syspaths"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-common","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-config","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-config"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-config-syspaths","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-config-syspaths"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-connect-engine","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-connect-engine"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-devel","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-errmsg","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-gssapi-server","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-gssapi-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-libs","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-oqgraph-engine","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-oqgraph-engine"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-pam","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-pam"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-server","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-server-galera","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-server-galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-server-galera-syspaths","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-server-galera-syspaths"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-server-syspaths","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-server-syspaths"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-server-utils","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-server-utils"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-server-utils-syspaths","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-server-utils-syspaths"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-syspaths","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-syspaths"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}},{"package":{"name":"rh-mariadb105-mariadb-test","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-mariadb105-mariadb-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.16-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:5759.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}