Bug 2049294 (CVE-2021-46658)

Summary: CVE-2021-46658 mariadb: save_window_function_values triggers an abort during IN subquery
Product: [Other] Security Response Reporter: Todd Cullum <tcullum>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: caswilli, damien.ciabrini, databases-maint, dbecker, dciabrin, gzaronik, hhorak, jburrell, jjoyce, jorton, jschluet, kaycoth, lhh, ljavorsk, lpeer, mbayer, mburns, mkocka, mmuzila, mschorm, sclewis, slinaber, SpikeFedora
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mariadb 10.2.40, mariadb 10.3.31, mariadb 10.4.21, mariadb 10.5.12, mariadb 10.6.3 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-27 02:45:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1992826, 2055679, 2055680, 2055681, 2055682, 2055683, 2055737, 2055738, 2055739, 2077000, 2077505, 2079857    
Bug Blocks: 2049295    

Description Todd Cullum 2022-02-01 21:11:46 UTC
save_window_function_values in MariaDB before 10.6.3 allows an application crash because of incorrect handling of with_window_func=true for IN subquery.

Reference: https://jira.mariadb.org/browse/MDEV-25630
Upstream patch: http://lists.askmonty.org/pipermail/commits/2021-May/014627.html

Comment 1 juneau 2022-02-03 16:29:29 UTC
Marking services-management-platform notaffected. Affected code is not present.
Marking openshift-hosted-osd3 affected/ooss.

Comment 3 Mauro Matteo Cascella 2022-02-17 15:42:21 UTC
Created mariadb:10.3/mariadb tracking bugs for this issue:

Affects: fedora-all [bug 2055737]


Created mariadb:10.4/mariadb tracking bugs for this issue:

Affects: fedora-all [bug 2055738]

Comment 5 errata-xmlrpc 2022-04-26 17:29:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:1556 https://access.redhat.com/errata/RHSA-2022:1556

Comment 6 errata-xmlrpc 2022-04-26 17:30:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:1557 https://access.redhat.com/errata/RHSA-2022:1557

Comment 7 Product Security DevOps Team 2022-04-27 02:45:30 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-46658

Comment 8 errata-xmlrpc 2022-05-31 12:16:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:4818 https://access.redhat.com/errata/RHSA-2022:4818