galera-26.4.14-1.el9.ML.1, mariadb-10.5.22-1.el9.ML.1

エラータID: AXSA:2023-6523:01

Release date: 
Friday, October 20, 2023 - 09:23
Subject: 
galera-26.4.14-1.el9.ML.1, mariadb-10.5.22-1.el9.ML.1
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

The following packages have been upgraded to a later upstream version: galera
(26.4.14), mariadb (10.5.22).

Security Fix(es):

* mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6 (CVE-2023-5157)
* mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc (CVE-2022-32081)
* mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc (CVE-2022-32082)
* mariadb: segmentation fault via the component sub_select (CVE-2022-32084)
* mariadb: server crash in st_select_lex_unit::exclude_level (CVE-2022-32089)
* mariadb: server crash in JOIN_CACHE::free or in copy_fields (CVE-2022-32091)
* mariadb: compress_write() fails to release mutex on failure (CVE-2022-38791)
* mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() (CVE-2022-47015)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-32081
MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.
CVE-2022-32082
MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.
CVE-2022-32084
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.
CVE-2022-32089
MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.
CVE-2022-32091
MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.
CVE-2022-38791
In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.
CVE-2022-47015
MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function spider_db_mbase::print_warnings to dereference a null pointer.
CVE-2023-5157
A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. galera-26.4.14-1.el9.ML.1.src.rpm
    MD5: 55759241097ff7649964bdf7ad8d5ad4
    SHA-256: 06ae45e86cd7bc98b31ec085b9e6055591ed207945de11f457e7040e5c0d9add
    Size: 3.55 MB
  2. mariadb-10.5.22-1.el9.ML.1.src.rpm
    MD5: 8d10586d7dbe0fb3ec0bb08d467f1edc
    SHA-256: 34eb21071bb9ef4f244c59c8814c6d5a228277152885210966e2c27215c62061
    Size: 91.81 MB

Asianux Server 9 for x86_64
  1. galera-26.4.14-1.el9.ML.1.x86_64.rpm
    MD5: f716f0d73f68812b07d328a2bcba1526
    SHA-256: ba2c752d884d1a6b9295d2adfdb553524d917524fa581e5ed6ec35d14b30a94d
    Size: 1.17 MB
  2. mariadb-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: e052957f50676ef6685f9e15823a120f
    SHA-256: 38708c120c276f1cc4c5312f2c44803ce7d3902ff37cde895bbed3fe7ba8bc8e
    Size: 1.56 MB
  3. mariadb-backup-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: 047b95e035ae73b5031790f005813572
    SHA-256: ef63e7d503848df7fabcba8617b34f569f3c43c52512f234a6e3ac5b7316cb16
    Size: 6.45 MB
  4. mariadb-common-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: 9b107b9bd43d9c4faac2daf5b9ae7e1e
    SHA-256: f57b4cadea831b9361d4f1c3dacb01d1f0568ff71e85549be2fd229f3bf599d6
    Size: 26.95 kB
  5. mariadb-devel-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: 50872d0a61ff87a9f0c3f0ac38dadcdf
    SHA-256: 3674a21883b06634f284eb93edc6e78766e1e1041f24fba8a3155bcead4b57e0
    Size: 1.00 MB
  6. mariadb-embedded-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: 2bcbb7bf8ca55f9f07e1b6d3f8057561
    SHA-256: 1740acef82d4789d705a21bee894197c6a27b5758a917a89ca89458c3d7097ae
    Size: 5.36 MB
  7. mariadb-embedded-devel-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: b38f0cfdc1bac0c9043683ff76295a6b
    SHA-256: a962e9c2a68beeb384756f0ba44b94d09919d49be7aaa423791a58aca9a6c4ac
    Size: 8.00 kB
  8. mariadb-errmsg-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: ae02760dad8dee46c1926b4a352ccbac
    SHA-256: d762650b7492d99d4e7fcc3a3c1c2c28a598567ed0a641ad93bbdd3d578847ee
    Size: 210.71 kB
  9. mariadb-gssapi-server-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: bbaf0c92609885616cb5ee796c09cf4a
    SHA-256: b38aa430d338ea3b95d3953ac9696ed729c431a190670a0707730ee03b95c657
    Size: 14.48 kB
  10. mariadb-oqgraph-engine-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: fd29d1be67889a7f67cd9f72ce89ab8d
    SHA-256: 34c8f59422ee41f916b9bbf110d2b6cba790cf19f73c0e47ebb701f548464fb5
    Size: 80.62 kB
  11. mariadb-pam-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: a149a0575cc7472d62afabac56d5def2
    SHA-256: 49e7d960b32c073549c7d7a6311b4ade5221fb640dfad4daf01f0a19bf83ddc4
    Size: 23.01 kB
  12. mariadb-server-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: c76555fdb426a87dfd4c7a06199d8742
    SHA-256: fbc7333c7dbf40c28e08aa8223831ac96447b7958f82272de621691d830fc140
    Size: 9.60 MB
  13. mariadb-server-galera-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: eeb3bb7cb66b029dce2b2a4e340d6159
    SHA-256: bd44ac6330e2ffd5cd57fc8d728c9d8bbcb4c9f689f203d9d8225679231db66b
    Size: 23.94 kB
  14. mariadb-server-utils-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: 4135579cbb5f52e44acb99d5edc169cc
    SHA-256: 7401a6b40c9d6893882c168eaa6b1be26d66f2b25ba00bcc32a8cee8907c9657
    Size: 209.74 kB
  15. mariadb-test-10.5.22-1.el9.ML.1.x86_64.rpm
    MD5: 5bf28d14d67636c5836d5a3251249c84
    SHA-256: 389e75fe9cd49a7192cd245fa62f4b9d6cabe5b9afb6aab29f32b9ba85c68cab
    Size: 29.16 MB