rh-mariadb103-galera-25.3.35-1.el7, rh-mariadb103-mariadb-10.3.35-1.el7

エラータID: AXSA:2022-3784:01

リリース日: 
2022/09/01 Thursday - 17:59
題名: 
rh-mariadb103-galera-25.3.35-1.el7, rh-mariadb103-mariadb-10.3.35-1.el7
影響のあるチャネル: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL.

The following packages have been upgraded to a later upstream version: rh-mariadb103-galera (25.3.35), rh-mariadb103-mariadb (10.3.35).

Security Fix(es):

* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083)
* mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085)
* mariadb: server crash in Item_args::walk_args (CVE-2022-32087)
* mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3

CVE-2021-46659
MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.
CVE-2021-46661
MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).
CVE-2021-46663
MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.
CVE-2021-46664
MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.
CVE-2021-46665
MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.
CVE-2021-46668
MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.
CVE-2021-46669
MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
CVE-2022-21427
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-24048
MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.
CVE-2022-24050
MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.
CVE-2022-24051
MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193.
CVE-2022-24052
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
CVE-2022-27376
MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.
CVE-2022-27377
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.
CVE-2022-27378
An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
CVE-2022-27379
An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
CVE-2022-27380
An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
CVE-2022-27381
An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
CVE-2022-27383
MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.
CVE-2022-27384
An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
CVE-2022-27386
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.
CVE-2022-27387
MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.
CVE-2022-27445
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.
CVE-2022-27447
MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.
CVE-2022-27448
There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.
CVE-2022-27449
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.
CVE-2022-27452
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.
CVE-2022-27456
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.
CVE-2022-27458
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h.
CVE-2022-31622
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
CVE-2022-31623
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
CVE-2022-32083
MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.
CVE-2022-32085
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.
CVE-2022-32087
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.
CVE-2022-32088
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. rh-mariadb103-galera-25.3.35-1.el7.src.rpm
    MD5: b28a82c2fcde6932fafebf2cd0f95c5f
    SHA-256: 279b5ef7192744e8eb49a4ba0ecf4e79a723b6d362384ac1bdb04d3e30812eb1
    Size: 3.24 MB
  2. rh-mariadb103-mariadb-10.3.35-1.el7.src.rpm
    MD5: c9403da42213e2df379f64cf7a0d11d8
    SHA-256: 68e23c482f81058ec26552c77e0e0cb8b004cda5fb5eb6c44c640b6ce734f04b
    Size: 64.66 MB

Asianux Server 7 for x86_64
  1. rh-mariadb103-galera-25.3.35-1.el7.x86_64.rpm
    MD5: d870f722c44dbdb3efb984da52f5925e
    SHA-256: 2fa38f1ba342ac01a5737eac783e7c0b2efbe1725a210ce4e75c6ecaa9a246d0
    Size: 1.05 MB
  2. rh-mariadb103-mariadb-10.3.35-1.el7.x86_64.rpm
    MD5: 4d97cb8a67dfb267e62c0573d983d2c9
    SHA-256: beeb6e7642e4582af29222d9cbd82e16c5e4c1b3c1bbbefeaeac1c291a6d5fff
    Size: 6.12 MB
  3. rh-mariadb103-mariadb-backup-10.3.35-1.el7.x86_64.rpm
    MD5: dc60ca6f85e7a47976421d3ef645cac6
    SHA-256: c317a1309fa2b63c3d29aa38b3da7edffc96bbcbc0aca80cd61467bfd21a673c
    Size: 6.27 MB
  4. rh-mariadb103-mariadb-backup-syspaths-10.3.35-1.el7.x86_64.rpm
    MD5: ce33dedcb79a36e4ac3169e2fc0527ab
    SHA-256: 30c028f3793134e222799de5edc91300e047cb929fd07627e65aac93b71d15bb
    Size: 40.48 kB
  5. rh-mariadb103-mariadb-common-10.3.35-1.el7.x86_64.rpm
    MD5: af3a02e10157783ff1abdcac39756151
    SHA-256: b7bfcf8a4fa27b3e3159e33b4956ae36549a5f0c9479a0b64f54058253df4f4e
    Size: 59.83 kB
  6. rh-mariadb103-mariadb-config-10.3.35-1.el7.x86_64.rpm
    MD5: fa71f2413a343e640590a35b4dcfe21d
    SHA-256: 3951c3031fd8cfaa0b175ff9f28f3421f6e8b99f74748e6a7ac52c55d1ad7311
    Size: 39.87 kB
  7. rh-mariadb103-mariadb-config-syspaths-10.3.35-1.el7.x86_64.rpm
    MD5: 1af2c6ab344e3c6e912cf8c1fa79c5c9
    SHA-256: 19ce830174ed5a6fccdef2a10bce9ccf3184dcd91738af74c520cb7115cdbab1
    Size: 39.89 kB
  8. rh-mariadb103-mariadb-devel-10.3.35-1.el7.x86_64.rpm
    MD5: 66dfbaf3b54db29cad0b9cf29270c5e8
    SHA-256: 919e4a074ce195132d74eb950262e497309ceae8be37a7e952f19735d5878791
    Size: 1.06 MB
  9. rh-mariadb103-mariadb-errmsg-10.3.35-1.el7.x86_64.rpm
    MD5: 67620113eac4b14e87d52708b6d86822
    SHA-256: bae0318ac2bbf11f98cc7b479a3a9847c9f00ca71dff78d96b6a5f3845caf0e7
    Size: 231.15 kB
  10. rh-mariadb103-mariadb-gssapi-server-10.3.35-1.el7.x86_64.rpm
    MD5: 689029a56670ec9564c0a8b67ac73102
    SHA-256: 08ec42f6ec6f92046689e2bc459cfbc2aedc242fa4d1afd3a896737418a7b9c4
    Size: 45.98 kB
  11. rh-mariadb103-mariadb-oqgraph-engine-10.3.35-1.el7.x86_64.rpm
    MD5: fea07e8465a0304990e0c40be9c67977
    SHA-256: 3bb7da86f0a80808b4a28274f7c0672e8589984a521da45a9fc1afac58c59432
    Size: 110.22 kB
  12. rh-mariadb103-mariadb-server-10.3.35-1.el7.x86_64.rpm
    MD5: 5b5de291cceb88a1b65803580a866da5
    SHA-256: 0f47317b278dc9dc1f0650b82e6cddfd2b22aedc0a802d0670cc44256945c66e
    Size: 16.96 MB
  13. rh-mariadb103-mariadb-server-galera-10.3.35-1.el7.x86_64.rpm
    MD5: 11e8f8abbe12bc0d3e158983a47cc399
    SHA-256: 988fb99f5f9ace5ed8ecce0ec778097d9d76e3eb413cd8ed6ed1efa8344a3846
    Size: 57.00 kB
  14. rh-mariadb103-mariadb-server-galera-syspaths-10.3.35-1.el7.x86_64.rpm
    MD5: b37af91d9f729479590b00339e9fd349
    SHA-256: bdd93d16342f845f5c56758643fffda97d5fbaec7ce238e79d5bacd01778dac6
    Size: 40.96 kB
  15. rh-mariadb103-mariadb-server-syspaths-10.3.35-1.el7.x86_64.rpm
    MD5: cd8ae2d4e6a67294c6ea3133726619f2
    SHA-256: f112fba990aae5babc6c422abef68be460ad01ecedd546c01613d6dd4a9a5b54
    Size: 47.73 kB
  16. rh-mariadb103-mariadb-server-utils-10.3.35-1.el7.x86_64.rpm
    MD5: e720ed5451c55d6b8163472e3cd3f2c2
    SHA-256: 5b9904e440a09f23817c999d851f0a80eb4dfbbd5c18684449b06f87223e47d4
    Size: 1.16 MB
  17. rh-mariadb103-mariadb-server-utils-syspaths-10.3.35-1.el7.x86_64.rpm
    MD5: aed0e4a3ec882d67bb8f0a5404669e15
    SHA-256: a575ad81203f732ea7a8982534243434f43843ed39c0aa408e9756ccd08ff0d2
    Size: 42.74 kB
  18. rh-mariadb103-mariadb-syspaths-10.3.35-1.el7.x86_64.rpm
    MD5: f157ba8bfa921e8924936dfe1ea261a8
    SHA-256: f8f39b6bf88ed2304596d2f43f8ab74e72222775d66eb349d6c83e1fea306fce
    Size: 44.33 kB
  19. rh-mariadb103-mariadb-test-10.3.35-1.el7.x86_64.rpm
    MD5: da40333501dd3009a50dced177c1f13c
    SHA-256: 203ab0726da531231df94402d0f148e951f98085263e2289a7acb47f4a296a3f
    Size: 22.36 MB