{"id":"RLSA-2022:1557","summary":"Moderate: mariadb:10.5 security, bug fix, and enhancement update","details":"MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. \n\nThe following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546)\n\nSecurity Fix(es):\n\n* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)\n\n* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)\n\n* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)\n\n* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)\n\n* mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658)\n\n* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)\n\n* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)\n\n* mariadb: No password masking in audit log when using ALTER USER \u003cuser\u003e IDENTIFIED BY \u003cpassword\u003e command (BZ#1981332)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515)\n\n* mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524)\n\n* Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542)","modified":"2026-02-05T10:00:10.847304Z","published":"2022-04-26T13:50:46Z","upstream":["CVE-2021-2154","CVE-2021-2166","CVE-2021-2372","CVE-2021-2389","CVE-2021-35604","CVE-2021-46657","CVE-2021-46658","CVE-2021-46662","CVE-2021-46666","CVE-2021-46667","CVE-2022-21451","CVE-2022-27385","CVE-2022-31621","CVE-2022-31624"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2022:1557"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992303"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992309"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016101"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049294"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049305"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050019"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050028"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050030"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050515"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050524"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050542"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050546"}],"affected":[{"package":{"name":"Judy","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/Judy?distro=rocky-linux-8-5-legacy&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+427+adf35707"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:1557.json"}},{"package":{"name":"galera","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/galera?distro=rocky-linux-8-5-legacy&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:26.4.9-4.module+el8.5.0+773+f75e97f7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:1557.json"}},{"package":{"name":"mariadb","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/mariadb?distro=rocky-linux-8-5-legacy&epoch=3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.5.13-1.module+el8.5.0+773+f75e97f7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:1557.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}