Bug 2069833 (CVE-2022-24050)

Summary: CVE-2022-24050 mariadb: lack of validating the existence of an object prior to performing operations on the object
Product: [Other] Security Response Reporter: Todd Cullum <tcullum>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: csutherl, damien.ciabrini, databases-maint, dciabrin, eglynn, gzaronik, hhorak, jclere, jjoyce, jorton, jwon, lhh, ljavorsk, mbayer, mburns, mkocka, mmuzila, mschorm, mturk, pjindal, SpikeFedora, spower
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mariadb 10.8.1, mariadb 10.7.2, mariadb 10.6.6, mariadb 10.5.14, mariadb 10.4.23 ,mariadb 10.3.33, mariadb 10.2.42 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-11-25 22:17:44 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2055709, 2068217, 2068219, 2078322, 2078323, 2078324, 2078325, 2078326, 2078327, 2078328, 2078329, 2078330, 2078331, 2078332, 2078333, 2078334, 2078335, 2078336, 2078337, 2090650, 2090651, 2090657, 2090658, 2095292, 2096273, 2101781, 2107051, 2107053, 2107056    
Bug Blocks: 2068210    

Description Todd Cullum 2022-03-29 19:37:15 UTC
This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account

References:
https://www.zerodayinitiative.com/advisories/ZDI-22-364/
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/

Comment 1 Sandipan Roy 2022-04-25 04:40:41 UTC
Created mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078322]
Affects: fedora-35 [bug 2078328]


Created mariadb:10.3/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078323]
Affects: fedora-35 [bug 2078329]


Created mariadb:10.4/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078324]
Affects: fedora-35 [bug 2078330]


Created mariadb:10.5/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078325]
Affects: fedora-35 [bug 2078331]


Created mariadb:10.6/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078326]
Affects: fedora-35 [bug 2078332]


Created mariadb:10.7/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078327]
Affects: fedora-35 [bug 2078333]

Comment 4 errata-xmlrpc 2022-07-28 16:06:14 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:5759 https://access.redhat.com/errata/RHSA-2022:5759

Comment 5 errata-xmlrpc 2022-08-02 10:10:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:5826 https://access.redhat.com/errata/RHSA-2022:5826

Comment 6 errata-xmlrpc 2022-08-09 12:24:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:5948 https://access.redhat.com/errata/RHSA-2022:5948

Comment 7 errata-xmlrpc 2022-09-01 14:18:26 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:6306 https://access.redhat.com/errata/RHSA-2022:6306

Comment 8 errata-xmlrpc 2022-09-13 09:42:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:6443 https://access.redhat.com/errata/RHSA-2022:6443

Comment 10 Product Security DevOps Team 2022-11-25 22:17:41 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-24050