rh-mariadb105-mariadb security and bug fix update

エラータID: AXSA:2022-3124:01

リリース日: 
2022/03/22 Tuesday - 14:30
題名: 
rh-mariadb105-mariadb security and bug fix update
影響のあるチャネル: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL.

The following packages have been upgraded to a later upstream version: rh-mariadb105-mariadb (10.5.13), rh-mariadb105-galera (26.4.9).

Security Fix(es):

* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604)
* mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667)
* mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657)
* mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662)
* mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666)
* mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* rh-mariadb105: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade
* Galera doesn't work without 'procps-ng' package [rhscl-3]

CVE-2021-2154
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2166
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2372
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2389
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-35604
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
CVE-2021-46657
get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY.
CVE-2021-46662
MariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.
CVE-2021-46666
MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.
CVE-2021-46667
MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. rh-mariadb105-galera-26.4.9-3.el7.src.rpm
    MD5: 6c84f39b7259f567e251962245412126
    SHA-256: 0c6302effc7b689e69ebbdb182ab903f2232d6efced2f2db069b52839cf7ec00
    Size: 3.42 MB
  2. rh-mariadb105-mariadb-10.5.13-1.el7.src.rpm
    MD5: f8a117c6b2084fe7128f975a9574b03b
    SHA-256: c1f9f6160f488c6515be9fe71faf789a672394781e1534a6e869934c7bfe34ee
    Size: 79.56 MB

Asianux Server 7 for x86_64
  1. rh-mariadb105-galera-26.4.9-3.el7.x86_64.rpm
    MD5: 8ee1be490d9736aeddce96fe56542605
    SHA-256: 7a52dcedafad5c91b129fb55c8af30675273764292b87c99cf197e6bfb6fd833
    Size: 1.16 MB
  2. rh-mariadb105-mariadb-10.5.13-1.el7.x86_64.rpm
    MD5: ed607791c18a7ada1ebea46f7919b087
    SHA-256: 4bea5a45fc4aef584dc31caf4c13e7fb808c82ec583122c782665422790dff80
    Size: 6.18 MB
  3. rh-mariadb105-mariadb-backup-10.5.13-1.el7.x86_64.rpm
    MD5: 717706107e64d3adb76687c3cbf6d78f
    SHA-256: 398664392bfc5cb23d7bd48690088a15e4802ead43ac837e787f6bd2074eed8b
    Size: 6.80 MB
  4. rh-mariadb105-mariadb-backup-syspaths-10.5.13-1.el7.x86_64.rpm
    MD5: ad660b72abb93459ddfd549bcd6bdf04
    SHA-256: 5b944194e567379e4692744f0e4febf6e6aa7f67d1788cde6b11e8bff0b40ca4
    Size: 43.76 kB
  5. rh-mariadb105-mariadb-common-10.5.13-1.el7.x86_64.rpm
    MD5: c67d9b1e471743edde65cf763938e35e
    SHA-256: a910942bc623a59c7333e0cbee2389ed849f01264a23ef358f990db0ce79e59d
    Size: 68.82 kB
  6. rh-mariadb105-mariadb-config-10.5.13-1.el7.x86_64.rpm
    MD5: c8daf1a1cc3529cbf9d0453be1013b72
    SHA-256: 25c8da6b3e595d4752ae64b03d2b937752d60bfdde569abcc9d5a070fa3418d0
    Size: 43.18 kB
  7. rh-mariadb105-mariadb-config-syspaths-10.5.13-1.el7.x86_64.rpm
    MD5: 1c0d0058d428095f4539ad76aa1c5486
    SHA-256: 175580bb860f660f37f5e32923174e360b3931b58bc674112975daed79c4f3f9
    Size: 43.17 kB
  8. rh-mariadb105-mariadb-connect-engine-10.5.13-1.el7.x86_64.rpm
    MD5: 843d43ba94a9dd0b6eacc3712065fee7
    SHA-256: 2f10e84ae2d4736171d0e583ec3539c80ec3ff4baa96dec9ac5bf3ff73ada2e9
    Size: 564.58 kB
  9. rh-mariadb105-mariadb-devel-10.5.13-1.el7.x86_64.rpm
    MD5: 1394a78bc550c6b69ad3d8a04a6fbffe
    SHA-256: 6ff6235c153d3cfe9bd190d27736f5e348fa92f16720efa3f10907e79e3237d8
    Size: 1.21 MB
  10. rh-mariadb105-mariadb-errmsg-10.5.13-1.el7.x86_64.rpm
    MD5: 216d49a6cc254a4f5c6438df675cf4da
    SHA-256: 7c0e9e413ec4b23983d1816037fa94b13133aec7fcf0efe7e660f9058df7354a
    Size: 235.75 kB
  11. rh-mariadb105-mariadb-gssapi-server-10.5.13-1.el7.x86_64.rpm
    MD5: bafe7d1961558d716f4384a5acf36d1b
    SHA-256: e3189e1930c5509314daae2d0ba8e531432ca1129a0830cd497d75b442fe0b06
    Size: 49.34 kB
  12. rh-mariadb105-mariadb-libs-10.5.13-1.el7.x86_64.rpm
    MD5: b0575f54de423f0b0656bdfcf689bd24
    SHA-256: 3b7b22fb30317a79a6b8ec76ca86b1c433fab5b670956b558d63af5515555a16
    Size: 158.80 kB
  13. rh-mariadb105-mariadb-oqgraph-engine-10.5.13-1.el7.x86_64.rpm
    MD5: 75fba289f1282342fe6ae115fbd1a516
    SHA-256: 090dbb8f47aeea8c80555c4460c595a9bdf9dea8cd7db8fd0552837f41f461f9
    Size: 109.07 kB
  14. rh-mariadb105-mariadb-pam-10.5.13-1.el7.x86_64.rpm
    MD5: 0a2f84d1424d5b6b7d7c1ad6432daa26
    SHA-256: e81223a33e83f4cc77097a5b391544cacfdc771c4c9b7c8010248f001010d0b2
    Size: 57.51 kB
  15. rh-mariadb105-mariadb-server-10.5.13-1.el7.x86_64.rpm
    MD5: 23b250c76e800782825f6e0403d4b5c8
    SHA-256: 70916440a9fd65b6ec95e9d986204e4b16a5b41d4149c35180d5583a01f7ae94
    Size: 18.06 MB
  16. rh-mariadb105-mariadb-server-galera-10.5.13-1.el7.x86_64.rpm
    MD5: 330e39214a3c5cffdfe4ded7d1f78fd8
    SHA-256: 80c93b758081a8f35aad9f8ffc8877c438b790d7c3967cf178b1db568a7c32d5
    Size: 51.94 kB
  17. rh-mariadb105-mariadb-server-syspaths-10.5.13-1.el7.x86_64.rpm
    MD5: 216cb5a7833127344b21c872f0709bca
    SHA-256: 7e19f510997d269d55facac8c657d9189b1a705ade59b9f46c5c67c5cff85246
    Size: 51.00 kB
  18. rh-mariadb105-mariadb-server-utils-10.5.13-1.el7.x86_64.rpm
    MD5: e03c1c2e9818427e35e88dd95b8bf9ae
    SHA-256: 68d05d19c063693fc0112a76d406df6f9d7172402b197605494a5d81b8686f40
    Size: 1.18 MB
  19. rh-mariadb105-mariadb-server-utils-syspaths-10.5.13-1.el7.x86_64.rpm
    MD5: ced7ab4ac6aa663f231797c262417b98
    SHA-256: 690e85376cdf39b06f5df5b6970dad56a3aabf3b02f0da29226a764e0f6224b0
    Size: 46.02 kB
  20. rh-mariadb105-mariadb-syspaths-10.5.13-1.el7.x86_64.rpm
    MD5: 494168b7e4b5a779e05ed2068aa5af42
    SHA-256: 161c32b27a5f6336eac93f4d10dd228e33af7520bbce61e2d4803a79213df506
    Size: 47.61 kB
  21. rh-mariadb105-mariadb-test-10.5.13-1.el7.x86_64.rpm
    MD5: 57de1e53d1fb075996f47dbe410668f3
    SHA-256: dba8ebac771716e335e62119b847cd6a7401cc864cedb9efb45b42fb323d203f
    Size: 14.66 MB