Bug 2068233 (CVE-2022-24051)

Summary: CVE-2022-24051 mariadb: lack of proper validation of a user-supplied string before using it as a format specifier
Product: [Other] Security Response Reporter: Todd Cullum <tcullum>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: csutherl, damien.ciabrini, databases-maint, dciabrin, eglynn, gzaronik, hhorak, jclere, jjoyce, jorton, jwon, lhh, ljavorsk, mbayer, mburns, mkocka, mmuzila, mschorm, mturk, pjindal, SpikeFedora, spower
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mariadb 10.8.1, mariadb 10.7.2, mariadb 10.6.6, mariadb 10.5.14, mariadb 10.4.23 ,mariadb 10.3.33, mariadb 10.2.42 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-11-25 20:54:23 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2055709, 2068217, 2068219, 2078293, 2078294, 2078295, 2078296, 2078297, 2078298, 2078299, 2078300, 2078301, 2078302, 2078303, 2078304, 2078305, 2078306, 2078307, 2078309, 2078334, 2090650, 2090651, 2090653, 2090654, 2095292, 2096273, 2101781, 2107051, 2107053, 2107057    
Bug Blocks: 2068210    

Description Todd Cullum 2022-03-24 17:50:26 UTC
MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account.

References:
https://mariadb.com/kb/en/security/
https://www.zerodayinitiative.com/advisories/ZDI-22-318/
https://security.netapp.com/advisory/ntap-20220318-0004/

Comment 1 Sandipan Roy 2022-04-25 04:33:06 UTC
Created mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078293]
Affects: fedora-35 [bug 2078299]


Created mariadb:10.3/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078294]
Affects: fedora-35 [bug 2078300]


Created mariadb:10.4/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078295]
Affects: fedora-35 [bug 2078301]


Created mariadb:10.5/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078296]
Affects: fedora-35 [bug 2078302]


Created mariadb:10.6/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078297]
Affects: fedora-35 [bug 2078303]


Created mariadb:10.7/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078298]
Affects: fedora-35 [bug 2078304]

Comment 4 errata-xmlrpc 2022-07-28 16:06:01 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:5759 https://access.redhat.com/errata/RHSA-2022:5759

Comment 5 errata-xmlrpc 2022-08-02 10:10:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:5826 https://access.redhat.com/errata/RHSA-2022:5826

Comment 6 errata-xmlrpc 2022-08-09 12:24:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:5948 https://access.redhat.com/errata/RHSA-2022:5948

Comment 7 errata-xmlrpc 2022-09-01 14:18:10 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:6306 https://access.redhat.com/errata/RHSA-2022:6306

Comment 8 errata-xmlrpc 2022-09-13 09:42:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:6443 https://access.redhat.com/errata/RHSA-2022:6443

Comment 10 Product Security DevOps Team 2022-11-25 20:54:20 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-24051