{"id":"RLSA-2022:6443","summary":"Moderate: mariadb:10.3 security and bug fix update","details":"MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. \n\nThe following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35).\n\nSecurity Fix(es):\n\n* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)\n\n* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)\n\n* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)\n\n* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)\n\n* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)\n\n* mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052)\n\n* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)\n\n* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)\n\n* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)\n\n* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)\n\n* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)\n\n* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)\n\n* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)\n\n* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)\n\n* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)\n\n* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)\n\n* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)\n\n* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)\n\n* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)\n\n* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)\n\n* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)\n\n* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)\n\n* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)\n\n* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)\n\n* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)\n\n* mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083)\n\n* mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085)\n\n* mariadb: server crash in Item_args::walk_args (CVE-2022-32087)\n\n* mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088)\n\n* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)\n\n* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)\n\n* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)\n\n* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)\n\n* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)\n\n* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075)","modified":"2026-02-04T20:15:12.764124Z","published":"2022-09-13T07:36:42Z","upstream":["CVE-2021-46659","CVE-2021-46661","CVE-2021-46663","CVE-2021-46664","CVE-2021-46665","CVE-2021-46668","CVE-2021-46669","CVE-2022-21427","CVE-2022-21595","CVE-2022-24048","CVE-2022-24050","CVE-2022-24051","CVE-2022-24052","CVE-2022-27376","CVE-2022-27377","CVE-2022-27378","CVE-2022-27379","CVE-2022-27380","CVE-2022-27381","CVE-2022-27383","CVE-2022-27384","CVE-2022-27386","CVE-2022-27387","CVE-2022-27445","CVE-2022-27447","CVE-2022-27448","CVE-2022-27449","CVE-2022-27452","CVE-2022-27456","CVE-2022-27458","CVE-2022-31622","CVE-2022-31623","CVE-2022-32083","CVE-2022-32085","CVE-2022-32087","CVE-2022-32088"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2022:6443"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049302"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050017"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050022"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050032"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050034"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068233"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2068234"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2069833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074817"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074951"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074981"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074996"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2074999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075005"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075006"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075694"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075695"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075697"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075700"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2076145"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082644"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092360"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106008"}],"affected":[{"package":{"name":"galera","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/galera?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:25.3.35-1.module+el8.6.0+1005+cdf19c22"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:6443.json"}},{"package":{"name":"Judy","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/Judy?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.5-18.module+el8.4.0+427+adf35707"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:6443.json"}},{"package":{"name":"mariadb","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/mariadb?distro=rocky-linux-8&epoch=3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:10.3.35-1.module+el8.6.0+1005+cdf19c22"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:6443.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}