Bug 2068233 (CVE-2022-24051) - CVE-2022-24051 mariadb: lack of proper validation of a user-supplied string before using it as a format specifier
Summary: CVE-2022-24051 mariadb: lack of proper validation of a user-supplied string b...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-24051
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2055709 2068217 2068219 2078293 2078294 2078295 2078296 2078297 2078298 2078299 2078300 2078301 2078302 2078303 2078304 2078305 2078306 2078307 2078309 2078334 2090650 2090651 2090653 2090654 2095292 2096273 2101781 2107051 2107053 2107057
Blocks: 2068210
TreeView+ depends on / blocked
 
Reported: 2022-03-24 17:50 UTC by Todd Cullum
Modified: 2022-11-25 20:54 UTC (History)
22 users (show)

Fixed In Version: mariadb 10.8.1, mariadb 10.7.2, mariadb 10.6.6, mariadb 10.5.14, mariadb 10.4.23 ,mariadb 10.3.33, mariadb 10.2.42
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-11-25 20:54:23 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:5759 0 None None None 2022-07-28 16:06:04 UTC
Red Hat Product Errata RHSA-2022:5826 0 None None None 2022-08-02 10:10:10 UTC
Red Hat Product Errata RHSA-2022:5948 0 None None None 2022-08-09 12:24:40 UTC
Red Hat Product Errata RHSA-2022:6306 0 None None None 2022-09-01 14:18:13 UTC
Red Hat Product Errata RHSA-2022:6443 0 None None None 2022-09-13 09:42:09 UTC

Description Todd Cullum 2022-03-24 17:50:26 UTC
MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account.

References:
https://mariadb.com/kb/en/security/
https://www.zerodayinitiative.com/advisories/ZDI-22-318/
https://security.netapp.com/advisory/ntap-20220318-0004/

Comment 1 Sandipan Roy 2022-04-25 04:33:06 UTC
Created mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078293]
Affects: fedora-35 [bug 2078299]


Created mariadb:10.3/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078294]
Affects: fedora-35 [bug 2078300]


Created mariadb:10.4/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078295]
Affects: fedora-35 [bug 2078301]


Created mariadb:10.5/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078296]
Affects: fedora-35 [bug 2078302]


Created mariadb:10.6/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078297]
Affects: fedora-35 [bug 2078303]


Created mariadb:10.7/mariadb tracking bugs for this issue:

Affects: fedora-34 [bug 2078298]
Affects: fedora-35 [bug 2078304]

Comment 4 errata-xmlrpc 2022-07-28 16:06:01 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:5759 https://access.redhat.com/errata/RHSA-2022:5759

Comment 5 errata-xmlrpc 2022-08-02 10:10:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:5826 https://access.redhat.com/errata/RHSA-2022:5826

Comment 6 errata-xmlrpc 2022-08-09 12:24:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:5948 https://access.redhat.com/errata/RHSA-2022:5948

Comment 7 errata-xmlrpc 2022-09-01 14:18:10 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:6306 https://access.redhat.com/errata/RHSA-2022:6306

Comment 8 errata-xmlrpc 2022-09-13 09:42:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:6443 https://access.redhat.com/errata/RHSA-2022:6443

Comment 10 Product Security DevOps Team 2022-11-25 20:54:20 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-24051


Note You need to log in before you can comment on or make changes to this bug.