{"id":"RHSA-2023:6821","summary":"Red Hat Security Advisory: mariadb:10.5 security update","modified":"2026-03-23T10:03:22Z","published":"2024-09-13T19:01:57Z","upstream":["CVE-2021-2154","CVE-2021-2166","CVE-2021-2372","CVE-2021-2389","CVE-2021-35604","CVE-2021-46657","CVE-2021-46658","CVE-2021-46659","CVE-2021-46661","CVE-2021-46662","CVE-2021-46663","CVE-2021-46664","CVE-2021-46665","CVE-2021-46666","CVE-2021-46667","CVE-2021-46668","CVE-2021-46669","CVE-2022-21451","CVE-2022-21595","CVE-2022-24048","CVE-2022-24050","CVE-2022-24051","CVE-2022-24052","CVE-2022-27376","CVE-2022-27377","CVE-2022-27378","CVE-2022-27379","CVE-2022-27380","CVE-2022-27381","CVE-2022-27382","CVE-2022-27383","CVE-2022-27384","CVE-2022-27385","CVE-2022-27386","CVE-2022-27387","CVE-2022-27444","CVE-2022-27445","CVE-2022-27446","CVE-2022-27447","CVE-2022-27448","CVE-2022-27449","CVE-2022-27451","CVE-2022-27452","CVE-2022-27455","CVE-2022-27456","CVE-2022-27457","CVE-2022-27458","CVE-2022-31621","CVE-2022-31622","CVE-2022-31623","CVE-2022-31624","CVE-2022-32081","CVE-2022-32082","CVE-2022-32083","CVE-2022-32084","CVE-2022-32085","CVE-2022-32086","CVE-2022-32087","CVE-2022-32088","CVE-2022-32089","CVE-2022-32091","CVE-2022-38791","CVE-2022-47015","CVE-2023-5157"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240246"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6821.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-2154"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951752"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-2154"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2154"},{"type":"ARTICLE","url":"https://www.oracle.com/security-alerts/cpuapr2021.html#AppendixMSQL"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-2166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951755"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-2166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2166"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-2372"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992303"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-2372"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2372"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-2389"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992309"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-2389"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2389"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35604"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016101"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-35604"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-35604"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46657"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46657"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46658"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049294"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46658"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46658"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46659"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049302"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46659"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46659"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46661"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050017"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46661"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46661"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46662"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050019"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46662"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46662"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46663"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050022"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46663"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46664"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050024"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46664"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46665"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050026"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46665"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46665"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46666"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46666"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46666"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050030"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46667"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46667"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46668"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050032"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46668"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46669"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050034"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46669"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082651"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21451"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21451"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142862"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21595"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21595"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24048"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068234"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24048"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24050"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069833"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24050"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24050"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24051"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068233"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24051"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24051"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068211"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24052"},{"type":"ARTICLE","url":"https://mariadb.com/kb/en/security/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074817"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27376"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27376"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074947"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27377"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27377"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074949"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27378"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27378"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074951"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27379"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27379"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27380"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074966"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27380"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27380"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074981"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27381"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27381"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27382"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074987"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27382"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27382"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074996"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27383"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27383"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27384"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074999"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27384"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27384"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27385"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075001"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27385"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27385"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075005"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27386"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27386"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27387"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075006"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27387"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27387"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075696"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27444"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27444"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27445"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075691"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27445"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27445"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27446"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075692"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27446"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27446"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27447"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075693"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27447"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27447"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27448"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075694"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27448"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27448"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27449"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075695"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27449"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27449"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27451"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2076144"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27451"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27451"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27452"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2076145"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27452"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27452"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27455"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075701"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27455"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27455"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27456"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075697"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27457"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075699"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27457"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-27458"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075700"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-27458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27458"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31621"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092353"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31621"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31622"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092354"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31622"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31622"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092360"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31623"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31623"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31624"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092362"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31624"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31624"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32081"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106028"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32081"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32081"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32082"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106030"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32082"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32082"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32083"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104425"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32083"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32083"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32084"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106034"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32084"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32084"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32085"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104431"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32085"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32085"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32086"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104433"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32086"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32086"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32087"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104434"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32087"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32087"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32088"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106008"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32088"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32088"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32089"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106035"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32089"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32089"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106042"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32091"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32091"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-38791"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130105"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-38791"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38791"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-47015"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163609"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-47015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-47015"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5157"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-5157"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5157"}],"affected":[{"package":{"name":"Judy","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/Judy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"Judy-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/Judy-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"Judy-debugsource","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/Judy-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/galera-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera-debugsource","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/galera-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-backup","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-backup"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-backup-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-backup-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-common","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-debugsource","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-devel","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded-devel","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-errmsg","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-gssapi-server","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-gssapi-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-gssapi-server-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-gssapi-server-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-oqgraph-engine","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-oqgraph-engine"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-oqgraph-engine-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-oqgraph-engine-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-pam","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-pam"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-pam-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-pam-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-galera","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-utils","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-utils"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-utils-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-utils-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-test","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-test-debuginfo","ecosystem":"Red Hat:rhel_aus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-test-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"Judy","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/Judy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"Judy-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/Judy-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"Judy-debugsource","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/Judy-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/galera-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera-debugsource","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/galera-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-backup","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-backup"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-backup-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-backup-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-common","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-debugsource","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-devel","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded-devel","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-errmsg","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-gssapi-server","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-gssapi-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-gssapi-server-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-gssapi-server-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-oqgraph-engine","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-oqgraph-engine"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-oqgraph-engine-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-oqgraph-engine-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-pam","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-pam"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-pam-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-pam-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-galera","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-utils","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-utils"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-utils-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-utils-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-test","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-test-debuginfo","ecosystem":"Red Hat:rhel_e4s:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-test-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"Judy","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/Judy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"Judy-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/Judy-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"Judy-debugsource","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/Judy-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+9031+9abc7af9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/galera-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"galera-debugsource","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/galera-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.14-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-backup","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-backup"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-backup-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-backup-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-common","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-debugsource","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-devel","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-embedded-devel","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-embedded-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-errmsg","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-gssapi-server","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-gssapi-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-gssapi-server-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-gssapi-server-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-oqgraph-engine","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-oqgraph-engine"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-oqgraph-engine-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-oqgraph-engine-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-pam","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-pam"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-pam-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-pam-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-galera","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-galera"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-utils","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-utils"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-server-utils-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-server-utils-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-test","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}},{"package":{"name":"mariadb-test-debuginfo","ecosystem":"Red Hat:rhel_tus:8.4::appstream","purl":"pkg:rpm/redhat/mariadb-test-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.22-1.module+el8.4.0+20291+fd32d29c"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:6821.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}