rh-mariadb103-mariadb security and bug fix update

エラータID: AXSA:2022-3123:01

リリース日: 
2022/03/22 Tuesday - 13:59
題名: 
rh-mariadb103-mariadb security and bug fix update
影響のあるチャネル: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL.

The following packages have been upgraded to a later upstream version: rh-mariadb103-mariadb (10.3.32), rh-mariadb103-galera (25.3.34).

Security Fix(es):

* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* rh-mariadb103: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade
* mysqld got signal 6, "WSREP: invalid state ROLLED_BACK (FATAL)"
* MariaDB logrotate leads to "gzip: stdin: file size changed while zipping"
* Galera doesn't work without 'procps-ng' package [rhscl-3]

CVE-2021-2154
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2166
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2372
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2389
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-35604
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
CVE-2021-46657
get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY.
CVE-2021-46662
MariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.
CVE-2021-46666
MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.
CVE-2021-46667
MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. rh-mariadb103-galera-25.3.34-4.el7.src.rpm
    MD5: ade612f477c90ac1424a95a577cffe54
    SHA-256: 07b4f9195a5bd807f7a7c6a779e8f841f36b844287fdedbe397a1ca2ed326cf0
    Size: 3.24 MB
  2. rh-mariadb103-mariadb-10.3.32-2.el7.src.rpm
    MD5: 6a45e474b6801d7e05fb58457955941c
    SHA-256: a49f608b4344d8f2d4eb5159712048db50316205088da3ff05f2fb9b4e547d7b
    Size: 64.56 MB

Asianux Server 7 for x86_64
  1. rh-mariadb103-galera-25.3.34-4.el7.x86_64.rpm
    MD5: 95df074c085c11d7a0d505a1a9857d2f
    SHA-256: 55d1fed63375361bd09edacc471e73f351932a153408788c3c27c43d097141ba
    Size: 1.05 MB
  2. rh-mariadb103-mariadb-10.3.32-2.el7.x86_64.rpm
    MD5: f02dde8a6d0a9a89f1a2c2779af8717f
    SHA-256: 4047c07bd88c6630ddc6d706405663b12f2eff7961542c8a3ad6433665ccfa5c
    Size: 6.12 MB
  3. rh-mariadb103-mariadb-backup-10.3.32-2.el7.x86_64.rpm
    MD5: b3aeadf6866c4a280a809532e5e84010
    SHA-256: ce99db72c23eca4938dd43bdf3f2412dbda5c3ec50ae4abdbd2cafbc3a48e335
    Size: 6.26 MB
  4. rh-mariadb103-mariadb-backup-syspaths-10.3.32-2.el7.x86_64.rpm
    MD5: 50fe196e6f23ca6476c0aac333f53fcc
    SHA-256: 226eee75edec6dd8539a993bf1ec1a17377e7156678c54ec83a140d1b90b1f6c
    Size: 40.31 kB
  5. rh-mariadb103-mariadb-common-10.3.32-2.el7.x86_64.rpm
    MD5: e15713c88701214bc18a41ace9584248
    SHA-256: 45585bf7d5722a9187abaf57b42fc4957ea8400dcbb5b5c88346dd065ae03576
    Size: 59.66 kB
  6. rh-mariadb103-mariadb-config-10.3.32-2.el7.x86_64.rpm
    MD5: 4384e9a0d8ee2db7125bd1fd7764c5f0
    SHA-256: 1a22ac7e15a9d6fd394709c41059a8d54e4238e2d34ec7acfc579d90c056a17b
    Size: 39.70 kB
  7. rh-mariadb103-mariadb-config-syspaths-10.3.32-2.el7.x86_64.rpm
    MD5: 914dadfd1ff1282f1a4589f7ba5a6401
    SHA-256: ea3c0399dfa1fc02c6d555571579f45ef01676492088454aa690d885a3c8f404
    Size: 39.72 kB
  8. rh-mariadb103-mariadb-devel-10.3.32-2.el7.x86_64.rpm
    MD5: b4d7770dd0769d6f2dcd9ebdb6026f1f
    SHA-256: df215510daa176521a14da80c546786a7a8ac809e002edf01a7d88669d1200e3
    Size: 1.06 MB
  9. rh-mariadb103-mariadb-errmsg-10.3.32-2.el7.x86_64.rpm
    MD5: 1b4a61d3e8c614e9def6230137737a42
    SHA-256: e84dae580b84e1e2072f265dba3475c80c8438e0f353d83bd311f26ff1d482a0
    Size: 230.95 kB
  10. rh-mariadb103-mariadb-gssapi-server-10.3.32-2.el7.x86_64.rpm
    MD5: 284dfe03ff5a80e7ecb6dd15442c0a46
    SHA-256: 8b27a3a6ad6a38726afc84bb6ecd4cd93628aebfd4e3889c06d511589cc1d494
    Size: 45.81 kB
  11. rh-mariadb103-mariadb-oqgraph-engine-10.3.32-2.el7.x86_64.rpm
    MD5: 3197662bd37c4e301b7d0472f2a9f8c5
    SHA-256: 01bccb5f1bd740254883609fa1ef0971421a2279ec915bde078937ea237b0108
    Size: 110.00 kB
  12. rh-mariadb103-mariadb-server-10.3.32-2.el7.x86_64.rpm
    MD5: de50cb4a347a5dc690e7c7e5fa7d6867
    SHA-256: 8c169322962ca0b63470fa65f45238211176286377f5075455537e294ca4dc06
    Size: 16.95 MB
  13. rh-mariadb103-mariadb-server-galera-10.3.32-2.el7.x86_64.rpm
    MD5: e80285b47cb79ece61e476c51ed53476
    SHA-256: 986a65127288d381e623bdcf09e5724d2f24d7ea965c7c31f9b9c631663ffa77
    Size: 56.82 kB
  14. rh-mariadb103-mariadb-server-galera-syspaths-10.3.32-2.el7.x86_64.rpm
    MD5: 2f40f7c69a91930232c7a55dc77ee9c6
    SHA-256: baadf0bcbc5d90c828cdc722b05e335a56978e3a31a79016bb07bfd7837ea7ad
    Size: 40.78 kB
  15. rh-mariadb103-mariadb-server-syspaths-10.3.32-2.el7.x86_64.rpm
    MD5: 5e9e5ec96b9f814674672351fc566216
    SHA-256: d8e3bcb2115b545f49c56111e0b026eae16f6f99a3493c134a42d0923063037c
    Size: 47.55 kB
  16. rh-mariadb103-mariadb-server-utils-10.3.32-2.el7.x86_64.rpm
    MD5: 10dc577edc694224c5d30fea3829b114
    SHA-256: 6369091fdfa8945661cd4220f21212be24fe58643e6591a16f111163d74600cd
    Size: 1.16 MB
  17. rh-mariadb103-mariadb-server-utils-syspaths-10.3.32-2.el7.x86_64.rpm
    MD5: 3bae792a5accabd7294271ccee4ad281
    SHA-256: 476c31ce06671d5568cf3a9224f3f2fe51dc5072f91f18ce9fa3076c18fb5783
    Size: 42.57 kB
  18. rh-mariadb103-mariadb-syspaths-10.3.32-2.el7.x86_64.rpm
    MD5: fa809624e85b65645a2253ddeb15ebb7
    SHA-256: 7afb83ba1b85125126bffc81e7357a8b6a2d10765442d2a38aa9d66070306045
    Size: 44.15 kB
  19. rh-mariadb103-mariadb-test-10.3.32-2.el7.x86_64.rpm
    MD5: da1b748bf13dc934a1b3c4d3d3a6278c
    SHA-256: 241e16d8b561a475af3bcfa593de13c464edb53c93a4f0c788160c8b6a2d204d
    Size: 22.28 MB