galera-26.4.14-1.el9.ML.1, mariadb-10.5.22-1.el9.ML.1
エラータID: AXSA:2023-6523:01
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: galera
(26.4.14), mariadb (10.5.22).
Security Fix(es):
* mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6 (CVE-2023-5157)
* mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc (CVE-2022-32081)
* mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc (CVE-2022-32082)
* mariadb: segmentation fault via the component sub_select (CVE-2022-32084)
* mariadb: server crash in st_select_lex_unit::exclude_level (CVE-2022-32089)
* mariadb: server crash in JOIN_CACHE::free or in copy_fields (CVE-2022-32091)
* mariadb: compress_write() fails to release mutex on failure (CVE-2022-38791)
* mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() (CVE-2022-47015)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2022-32081
MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.
CVE-2022-32082
MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.
CVE-2022-32084
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.
CVE-2022-32089
MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.
CVE-2022-32091
MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.
CVE-2022-38791
In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.
CVE-2022-47015
MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function spider_db_mbase::print_warnings to dereference a null pointer.
CVE-2023-5157
A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
Update packages.
MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.
MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.
MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.
MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.
In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.
MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function spider_db_mbase::print_warnings to dereference a null pointer.
A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
N/A
SRPMS
- galera-26.4.14-1.el9.ML.1.src.rpm
MD5: 55759241097ff7649964bdf7ad8d5ad4
SHA-256: 06ae45e86cd7bc98b31ec085b9e6055591ed207945de11f457e7040e5c0d9add
Size: 3.55 MB - mariadb-10.5.22-1.el9.ML.1.src.rpm
MD5: 8d10586d7dbe0fb3ec0bb08d467f1edc
SHA-256: 34eb21071bb9ef4f244c59c8814c6d5a228277152885210966e2c27215c62061
Size: 91.81 MB
Asianux Server 9 for x86_64
- galera-26.4.14-1.el9.ML.1.x86_64.rpm
MD5: f716f0d73f68812b07d328a2bcba1526
SHA-256: ba2c752d884d1a6b9295d2adfdb553524d917524fa581e5ed6ec35d14b30a94d
Size: 1.17 MB - mariadb-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: e052957f50676ef6685f9e15823a120f
SHA-256: 38708c120c276f1cc4c5312f2c44803ce7d3902ff37cde895bbed3fe7ba8bc8e
Size: 1.56 MB - mariadb-backup-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: 047b95e035ae73b5031790f005813572
SHA-256: ef63e7d503848df7fabcba8617b34f569f3c43c52512f234a6e3ac5b7316cb16
Size: 6.45 MB - mariadb-common-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: 9b107b9bd43d9c4faac2daf5b9ae7e1e
SHA-256: f57b4cadea831b9361d4f1c3dacb01d1f0568ff71e85549be2fd229f3bf599d6
Size: 26.95 kB - mariadb-devel-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: 50872d0a61ff87a9f0c3f0ac38dadcdf
SHA-256: 3674a21883b06634f284eb93edc6e78766e1e1041f24fba8a3155bcead4b57e0
Size: 1.00 MB - mariadb-embedded-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: 2bcbb7bf8ca55f9f07e1b6d3f8057561
SHA-256: 1740acef82d4789d705a21bee894197c6a27b5758a917a89ca89458c3d7097ae
Size: 5.36 MB - mariadb-embedded-devel-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: b38f0cfdc1bac0c9043683ff76295a6b
SHA-256: a962e9c2a68beeb384756f0ba44b94d09919d49be7aaa423791a58aca9a6c4ac
Size: 8.00 kB - mariadb-errmsg-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: ae02760dad8dee46c1926b4a352ccbac
SHA-256: d762650b7492d99d4e7fcc3a3c1c2c28a598567ed0a641ad93bbdd3d578847ee
Size: 210.71 kB - mariadb-gssapi-server-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: bbaf0c92609885616cb5ee796c09cf4a
SHA-256: b38aa430d338ea3b95d3953ac9696ed729c431a190670a0707730ee03b95c657
Size: 14.48 kB - mariadb-oqgraph-engine-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: fd29d1be67889a7f67cd9f72ce89ab8d
SHA-256: 34c8f59422ee41f916b9bbf110d2b6cba790cf19f73c0e47ebb701f548464fb5
Size: 80.62 kB - mariadb-pam-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: a149a0575cc7472d62afabac56d5def2
SHA-256: 49e7d960b32c073549c7d7a6311b4ade5221fb640dfad4daf01f0a19bf83ddc4
Size: 23.01 kB - mariadb-server-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: c76555fdb426a87dfd4c7a06199d8742
SHA-256: fbc7333c7dbf40c28e08aa8223831ac96447b7958f82272de621691d830fc140
Size: 9.60 MB - mariadb-server-galera-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: eeb3bb7cb66b029dce2b2a4e340d6159
SHA-256: bd44ac6330e2ffd5cd57fc8d728c9d8bbcb4c9f689f203d9d8225679231db66b
Size: 23.94 kB - mariadb-server-utils-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: 4135579cbb5f52e44acb99d5edc169cc
SHA-256: 7401a6b40c9d6893882c168eaa6b1be26d66f2b25ba00bcc32a8cee8907c9657
Size: 209.74 kB - mariadb-test-10.5.22-1.el9.ML.1.x86_64.rpm
MD5: 5bf28d14d67636c5836d5a3251249c84
SHA-256: 389e75fe9cd49a7192cd245fa62f4b9d6cabe5b9afb6aab29f32b9ba85c68cab
Size: 29.16 MB