<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0017</id>
    <title>An update for mariadb is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2024-01-03 03:35:57"/>
    <updated date="2024-01-03 03:35:57"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-24048" id="CVE-2022-24048" title="CVE-2022-24048 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-46658" id="CVE-2021-46658" title="CVE-2021-46658 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27445" id="CVE-2022-27445" title="CVE-2022-27445 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27447" id="CVE-2022-27447" title="CVE-2022-27447 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-46668" id="CVE-2021-46668" title="CVE-2021-46668 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27457" id="CVE-2022-27457" title="CVE-2022-27457 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27455" id="CVE-2022-27455" title="CVE-2022-27455 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27387" id="CVE-2022-27387" title="CVE-2022-27387 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-24050" id="CVE-2022-24050" title="CVE-2022-24050 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27383" id="CVE-2022-27383" title="CVE-2022-27383 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27449" id="CVE-2022-27449" title="CVE-2022-27449 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27381" id="CVE-2022-27381" title="CVE-2022-27381 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27378" id="CVE-2022-27378" title="CVE-2022-27378 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27386" id="CVE-2022-27386" title="CVE-2022-27386 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27448" id="CVE-2022-27448" title="CVE-2022-27448 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27456" id="CVE-2022-27456" title="CVE-2022-27456 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27376" id="CVE-2022-27376" title="CVE-2022-27376 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27444" id="CVE-2022-27444" title="CVE-2022-27444 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27458" id="CVE-2022-27458" title="CVE-2022-27458 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27377" id="CVE-2022-27377" title="CVE-2022-27377 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27451" id="CVE-2022-27451" title="CVE-2022-27451 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27380" id="CVE-2022-27380" title="CVE-2022-27380 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27385" id="CVE-2022-27385" title="CVE-2022-27385 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27382" id="CVE-2022-27382" title="CVE-2022-27382 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27379" id="CVE-2022-27379" title="CVE-2022-27379 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27446" id="CVE-2022-27446" title="CVE-2022-27446 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-24052" id="CVE-2022-24052" title="CVE-2022-24052 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-24051" id="CVE-2022-24051" title="CVE-2022-24051 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27384" id="CVE-2022-27384" title="CVE-2022-27384 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-27452" id="CVE-2022-27452" title="CVE-2022-27452 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191. (CVE-2022-24048)

save_window_function_values in MariaDB before 10.6.3 allows an application crash because of incorrect handling of with_window_func=true for a subquery. (CVE-2021-46658)

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc. (CVE-2022-27445)

MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h. (CVE-2022-27447)

MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures. (CVE-2021-46668)

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c. (CVE-2022-27457)

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c. (CVE-2022-27455)

MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements. (CVE-2022-27387)

MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207. (CVE-2022-24050)

MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements. (CVE-2022-27383)

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148. (CVE-2022-27449)

An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27381)

An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27378)

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc. (CVE-2022-27386)

There is an Assertion failure in MariaDB Server v10.9 and below via 'node-&gt;pcur-&gt;rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc. (CVE-2022-27448)

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc. (CVE-2022-27456)

MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements. (CVE-2022-27376)

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc. (CVE-2022-27444)

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h. (CVE-2022-27458)

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements. (CVE-2022-27377)

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc. (CVE-2022-27451)

An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27380)

An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27385)

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order. (CVE-2022-27382)

An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27379)

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h. (CVE-2022-27446)

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190. (CVE-2022-24052)

MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193. (CVE-2022-24051)

An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27384)

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc. (CVE-2022-27452)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="mariadb">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="mariadb" version="10.5.22" release="1.hce2">
          <filename>mariadb-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-backup" version="10.5.22" release="1.hce2">
          <filename>mariadb-backup-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-common" version="10.5.22" release="1.hce2">
          <filename>mariadb-common-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-config" version="10.5.22" release="1.hce2">
          <filename>mariadb-config-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-devel" version="10.5.22" release="1.hce2">
          <filename>mariadb-devel-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-embedded" version="10.5.22" release="1.hce2">
          <filename>mariadb-embedded-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-embedded-devel" version="10.5.22" release="1.hce2">
          <filename>mariadb-embedded-devel-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-errmsg" version="10.5.22" release="1.hce2">
          <filename>mariadb-errmsg-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-gssapi-server" version="10.5.22" release="1.hce2">
          <filename>mariadb-gssapi-server-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-oqgraph-engine" version="10.5.22" release="1.hce2">
          <filename>mariadb-oqgraph-engine-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-pam" version="10.5.22" release="1.hce2">
          <filename>mariadb-pam-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-server" version="10.5.22" release="1.hce2">
          <filename>mariadb-server-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-server-galera" version="10.5.22" release="1.hce2">
          <filename>mariadb-server-galera-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-server-utils" version="10.5.22" release="1.hce2">
          <filename>mariadb-server-utils-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mariadb-test" version="10.5.22" release="1.hce2">
          <filename>mariadb-test-10.5.22-1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb" version="10.5.22" release="1.hce2">
          <filename>mariadb-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-backup" version="10.5.22" release="1.hce2">
          <filename>mariadb-backup-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-common" version="10.5.22" release="1.hce2">
          <filename>mariadb-common-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-config" version="10.5.22" release="1.hce2">
          <filename>mariadb-config-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-devel" version="10.5.22" release="1.hce2">
          <filename>mariadb-devel-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-embedded" version="10.5.22" release="1.hce2">
          <filename>mariadb-embedded-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-embedded-devel" version="10.5.22" release="1.hce2">
          <filename>mariadb-embedded-devel-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-errmsg" version="10.5.22" release="1.hce2">
          <filename>mariadb-errmsg-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-gssapi-server" version="10.5.22" release="1.hce2">
          <filename>mariadb-gssapi-server-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-oqgraph-engine" version="10.5.22" release="1.hce2">
          <filename>mariadb-oqgraph-engine-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-pam" version="10.5.22" release="1.hce2">
          <filename>mariadb-pam-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-server" version="10.5.22" release="1.hce2">
          <filename>mariadb-server-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-server-galera" version="10.5.22" release="1.hce2">
          <filename>mariadb-server-galera-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-server-utils" version="10.5.22" release="1.hce2">
          <filename>mariadb-server-utils-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mariadb-test" version="10.5.22" release="1.hce2">
          <filename>mariadb-test-10.5.22-1.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
