{"schema_version":"1.7.2","id":"OESA-2022-1587","modified":"2022-03-19T11:03:39Z","published":"2022-03-19T11:03:39Z","upstream":["CVE-2021-46669","CVE-2021-46661","CVE-2021-46667","CVE-2021-46666","CVE-2021-46662","CVE-2021-46663","CVE-2021-46665","CVE-2021-46664","CVE-2021-46659","CVE-2021-46657"],"summary":"mariadb security update","details":"MariaDB is a community developed fork from MySQL - a multi-user, multi-threaded SQL database server. It is a client/server implementation consisting of a server daemon (mariadbd) and many different client programs and libraries. The base package contains the standard MariaDB/MySQL client programs and utilities.\r\n\r\nMariaDB turns data into structured information in a wide array of applications, ranging from banking to websites. It is an enhanced, drop-in replacement for MySQL. MariaDB is used because it is fast, scalable and robust, with a rich ecosystem of storage engines, plugins and many other tools make it very versatile for a wide variety of use cases.\r\n\r\nSecurity Fix(es):\r\n\r\nMariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.(CVE-2021-46669)\r\n\r\nMariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).(CVE-2021-46661)\r\n\r\nMariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.(CVE-2021-46667)\r\n\r\nMariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.(CVE-2021-46666)\r\n\r\nMariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.(CVE-2021-46662)\r\n\r\nMariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.(CVE-2021-46663)\r\n\r\nMariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.(CVE-2021-46665)\r\n\r\nMariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.(CVE-2021-46664)\r\n\r\nMariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.(CVE-2021-46659)\r\n\r\nget_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY.(CVE-2021-46657)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"mariadb","purl":"pkg:rpm/openEuler/mariadb\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.3.34-1.oe1"}]}],"ecosystem_specific":{"aarch64":["mariadb-embedded-devel-10.3.34-1.oe1.aarch64.rpm","mariadb-oqgraph-engine-10.3.34-1.oe1.aarch64.rpm","mariadb-cracklib-10.3.34-1.oe1.aarch64.rpm","mariadb-backup-10.3.34-1.oe1.aarch64.rpm","mariadb-debugsource-10.3.34-1.oe1.aarch64.rpm","mariadb-common-10.3.34-1.oe1.aarch64.rpm","mariadb-10.3.34-1.oe1.aarch64.rpm","mariadb-server-10.3.34-1.oe1.aarch64.rpm","mariadb-debuginfo-10.3.34-1.oe1.aarch64.rpm","mariadb-server-galera-10.3.34-1.oe1.aarch64.rpm","mariadb-gssapi-server-10.3.34-1.oe1.aarch64.rpm","mariadb-errmessage-10.3.34-1.oe1.aarch64.rpm","mariadb-test-10.3.34-1.oe1.aarch64.rpm","mariadb-embedded-10.3.34-1.oe1.aarch64.rpm","mariadb-devel-10.3.34-1.oe1.aarch64.rpm"],"src":["mariadb-10.3.34-1.oe1.src.rpm"],"x86_64":["mariadb-10.3.34-1.oe1.x86_64.rpm","mariadb-backup-10.3.34-1.oe1.x86_64.rpm","mariadb-test-10.3.34-1.oe1.x86_64.rpm","mariadb-gssapi-server-10.3.34-1.oe1.x86_64.rpm","mariadb-cracklib-10.3.34-1.oe1.x86_64.rpm","mariadb-debuginfo-10.3.34-1.oe1.x86_64.rpm","mariadb-embedded-10.3.34-1.oe1.x86_64.rpm","mariadb-errmessage-10.3.34-1.oe1.x86_64.rpm","mariadb-debugsource-10.3.34-1.oe1.x86_64.rpm","mariadb-server-galera-10.3.34-1.oe1.x86_64.rpm","mariadb-devel-10.3.34-1.oe1.x86_64.rpm","mariadb-embedded-devel-10.3.34-1.oe1.x86_64.rpm","mariadb-common-10.3.34-1.oe1.x86_64.rpm","mariadb-server-10.3.34-1.oe1.x86_64.rpm","mariadb-oqgraph-engine-10.3.34-1.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP2","name":"mariadb","purl":"pkg:rpm/openEuler/mariadb\u0026distro=openEuler-20.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.3.34-1.oe1"}]}],"ecosystem_specific":{"aarch64":["mariadb-debuginfo-10.3.34-1.oe1.aarch64.rpm","mariadb-common-10.3.34-1.oe1.aarch64.rpm","mariadb-errmessage-10.3.34-1.oe1.aarch64.rpm","mariadb-debugsource-10.3.34-1.oe1.aarch64.rpm","mariadb-backup-10.3.34-1.oe1.aarch64.rpm","mariadb-embedded-10.3.34-1.oe1.aarch64.rpm","mariadb-test-10.3.34-1.oe1.aarch64.rpm","mariadb-server-10.3.34-1.oe1.aarch64.rpm","mariadb-oqgraph-engine-10.3.34-1.oe1.aarch64.rpm","mariadb-server-galera-10.3.34-1.oe1.aarch64.rpm","mariadb-embedded-devel-10.3.34-1.oe1.aarch64.rpm","mariadb-10.3.34-1.oe1.aarch64.rpm","mariadb-devel-10.3.34-1.oe1.aarch64.rpm","mariadb-gssapi-server-10.3.34-1.oe1.aarch64.rpm","mariadb-cracklib-10.3.34-1.oe1.aarch64.rpm"],"src":["mariadb-10.3.34-1.oe1.src.rpm"],"x86_64":["mariadb-errmessage-10.3.34-1.oe1.x86_64.rpm","mariadb-cracklib-10.3.34-1.oe1.x86_64.rpm","mariadb-devel-10.3.34-1.oe1.x86_64.rpm","mariadb-common-10.3.34-1.oe1.x86_64.rpm","mariadb-10.3.34-1.oe1.x86_64.rpm","mariadb-test-10.3.34-1.oe1.x86_64.rpm","mariadb-oqgraph-engine-10.3.34-1.oe1.x86_64.rpm","mariadb-debugsource-10.3.34-1.oe1.x86_64.rpm","mariadb-server-galera-10.3.34-1.oe1.x86_64.rpm","mariadb-embedded-10.3.34-1.oe1.x86_64.rpm","mariadb-gssapi-server-10.3.34-1.oe1.x86_64.rpm","mariadb-debuginfo-10.3.34-1.oe1.x86_64.rpm","mariadb-embedded-devel-10.3.34-1.oe1.x86_64.rpm","mariadb-server-10.3.34-1.oe1.x86_64.rpm","mariadb-backup-10.3.34-1.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"mariadb","purl":"pkg:rpm/openEuler/mariadb\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.3.34-1.oe1"}]}],"ecosystem_specific":{"aarch64":["mariadb-10.3.34-1.oe1.aarch64.rpm","mariadb-cracklib-10.3.34-1.oe1.aarch64.rpm","mariadb-common-10.3.34-1.oe1.aarch64.rpm","mariadb-embedded-devel-10.3.34-1.oe1.aarch64.rpm","mariadb-test-10.3.34-1.oe1.aarch64.rpm","mariadb-server-10.3.34-1.oe1.aarch64.rpm","mariadb-devel-10.3.34-1.oe1.aarch64.rpm","mariadb-server-galera-10.3.34-1.oe1.aarch64.rpm","mariadb-embedded-10.3.34-1.oe1.aarch64.rpm","mariadb-backup-10.3.34-1.oe1.aarch64.rpm","mariadb-gssapi-server-10.3.34-1.oe1.aarch64.rpm","mariadb-errmessage-10.3.34-1.oe1.aarch64.rpm","mariadb-debugsource-10.3.34-1.oe1.aarch64.rpm","mariadb-debuginfo-10.3.34-1.oe1.aarch64.rpm","mariadb-oqgraph-engine-10.3.34-1.oe1.aarch64.rpm"],"src":["mariadb-10.3.34-1.oe1.src.rpm"],"x86_64":["mariadb-gssapi-server-10.3.34-1.oe1.x86_64.rpm","mariadb-common-10.3.34-1.oe1.x86_64.rpm","mariadb-backup-10.3.34-1.oe1.x86_64.rpm","mariadb-debugsource-10.3.34-1.oe1.x86_64.rpm","mariadb-debuginfo-10.3.34-1.oe1.x86_64.rpm","mariadb-devel-10.3.34-1.oe1.x86_64.rpm","mariadb-errmessage-10.3.34-1.oe1.x86_64.rpm","mariadb-embedded-10.3.34-1.oe1.x86_64.rpm","mariadb-oqgraph-engine-10.3.34-1.oe1.x86_64.rpm","mariadb-embedded-devel-10.3.34-1.oe1.x86_64.rpm","mariadb-cracklib-10.3.34-1.oe1.x86_64.rpm","mariadb-server-galera-10.3.34-1.oe1.x86_64.rpm","mariadb-server-10.3.34-1.oe1.x86_64.rpm","mariadb-test-10.3.34-1.oe1.x86_64.rpm","mariadb-10.3.34-1.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"mariadb","purl":"pkg:rpm/openEuler/mariadb\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.5.15-2.oe2203"}]}],"ecosystem_specific":{"aarch64":["mariadb-10.5.15-2.oe2203.aarch64.rpm","mariadb-config-10.5.15-2.oe2203.aarch64.rpm","mariadb-common-10.5.15-2.oe2203.aarch64.rpm","mariadb-embedded-devel-10.5.15-2.oe2203.aarch64.rpm","mariadb-test-10.5.15-2.oe2203.aarch64.rpm","mariadb-server-10.5.15-2.oe2203.aarch64.rpm","mariadb-devel-10.5.15-2.oe2203.aarch64.rpm","mariadb-server-galera-10.5.15-2.oe2203.aarch64.rpm","mariadb-embedded-10.5.15-2.oe2203.aarch64.rpm","mariadb-backup-10.5.15-2.oe2203.aarch64.rpm","mariadb-gssapi-server-10.5.15-2.oe2203.aarch64.rpm","mariadb-errmsg-10.5.15-2.oe2203.aarch64.rpm","mariadb-debugsource-10.5.15-2.oe2203.aarch64.rpm","mariadb-debuginfo-10.5.15-2.oe2203.aarch64.rpm","mariadb-oqgraph-engine-10.5.15-2.oe2203.aarch64.rpm","mariadb-pam-10.5.15-2.oe2203.aarch64.rpm","mariadb-rocksdb-engine-10.5.15-2.oe2203.aarch64.rpm","mariadb-server-uitls-10.5.15-2.oe2203.aarch64.rpm"],"src":["mariadb-10.5.15-2.oe2203.src.rpm"],"x86_64":["mariadb-gssapi-server-10.5.15-2.oe1.x86_64.rpm","mariadb-common-10.5.15-2.oe1.x86_64.rpm","mariadb-backup-10.5.15-2.oe1.x86_64.rpm","mariadb-debugsource-10.5.15-2.oe1.x86_64.rpm","mariadb-debuginfo-10.5.15-2.oe1.x86_64.rpm","mariadb-devel-10.5.15-2.oe1.x86_64.rpm","mariadb-errmsg-10.5.15-2.oe1.x86_64.rpm","mariadb-embedded-10.5.15-2.oe1.x86_64.rpm","mariadb-oqgraph-engine-10.5.15-2.oe1.x86_64.rpm","mariadb-embedded-devel-10.5.15-2.oe1.x86_64.rpm","mariadb-config-10.5.15-2.oe1.x86_64.rpm","mariadb-server-galera-10.5.15-2.oe1.x86_64.rpm","mariadb-server-10.5.15-2.oe1.x86_64.rpm","mariadb-test-10.5.15-2.oe1.x86_64.rpm","mariadb-10.5.15-2.oe1.x86_64.rpm","mariadb-pam-10.5.15-2.oe1.x86_64.rpm","mariadb-server-utils-10.5.15-2.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1587"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46661"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46667"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46666"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46662"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46665"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46659"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46657"}],"database_specific":{"severity":"High"}}