Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery
  • CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE)
  • CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements
  • CVE-2021-46664: mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr
  • CVE-2021-46665: mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations
  • CVE-2021-46668: mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements
  • CVE-2021-46669: mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used
  • CVE-2022-24048: mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer
  • CVE-2022-24050: mariadb: lack of validating the existence of an object prior to performing operations on the object
  • CVE-2022-24051: mariadb: lack of proper validation of a user-supplied string before using it as a format specifier
  • CVE-2022-24052: mariadb: CONNECT storage engine heap-based buffer overflow
  • CVE-2022-27376: mariadb: assertion failure in Item_args::walk_arg
  • CVE-2022-27377: mariadb: use-after-poison when complex conversion is involved in blob
  • CVE-2022-27378: mariadb: server crash in create_tmp_table::finalize
  • CVE-2022-27379: mariadb: server crash in component arg_comparator::compare_real_fixed
  • CVE-2022-27380: mariadb: server crash at my_decimal::operator=
  • CVE-2022-27381: mariadb: server crash at Field::set_default via specially crafted SQL statements
  • CVE-2022-27382: mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order
  • CVE-2022-27383: mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c
  • CVE-2022-27384: mariadb: crash via component Item_subselect::init_expr_cache_tracker
  • CVE-2022-27386: mariadb: server crashes in query_arena::set_query_arena upon SELECT from view
  • CVE-2022-27387: mariadb: assertion failures in decimal_bin_size
  • CVE-2022-27444: mariadb: crash when using HAVING with NOT EXIST predicate in an equality
  • CVE-2022-27445: mariadb: assertion failure in compare_order_elements
  • CVE-2022-27446: mariadb: crash when using HAVING with IS NULL predicate in an equality
  • CVE-2022-27447: mariadb: use-after-poison in Binary_string::free_buffer
  • CVE-2022-27448: mariadb: crash in multi-update and implicit grouping
  • CVE-2022-27449: mariadb: assertion failure in sql/item_func.cc
  • CVE-2022-27451: mariadb: crash via window function in expression in ORDER BY
  • CVE-2022-27452: mariadb: assertion failure in sql/item_cmpfunc.cc
  • CVE-2022-27455: mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING
  • CVE-2022-27456: mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc
  • CVE-2022-27457: mariadb: incorrect key in “dup value” error after long unique
  • CVE-2022-27458: mariadb: use-after-poison in Binary_string::free_buffer
  • CVE-2022-31622: mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc
  • CVE-2022-31623: mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc
Red Hat Security Data
#sql#vulnerability#linux#red_hat#buffer_overflow#ibm#sap

Synopsis

Moderate: mariadb:10.5 security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16).

Security Fix(es):

  • mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
  • mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
  • mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
  • mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
  • mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)
  • mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
  • mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
  • mariadb: crash in create_tmp_table::finalize (CVE-2022-27378)
  • mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
  • mariadb: crash at my_decimal::operator= (CVE-2022-27380)
  • mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
  • mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)
  • mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
  • mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
  • mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
  • mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
  • mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)
  • mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
  • mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)
  • mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
  • mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
  • mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
  • mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)
  • mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
  • mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)
  • mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
  • mariadb: incorrect key in “dup value” error after long unique (CVE-2022-27457)
  • mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
  • mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
  • mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
  • mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
  • mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
  • mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
  • mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
  • mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665)
  • mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Don’t use less parallelism if not necessary (BZ#2096934)
  • Links in galera package description are bad (BZ#2096935)
  • [Tracker] Rebase to Galera 26.4.11 (BZ#2096936)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2049302 - CVE-2021-46659 mariadb: Crash executing query with VIEW, aggregate and subquery
  • BZ - 2050017 - CVE-2021-46661 mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE)
  • BZ - 2050022 - CVE-2021-46663 mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements
  • BZ - 2050024 - CVE-2021-46664 mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr
  • BZ - 2050026 - CVE-2021-46665 mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations
  • BZ - 2050032 - CVE-2021-46668 mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements
  • BZ - 2050034 - CVE-2021-46669 mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used
  • BZ - 2068211 - CVE-2022-24052 mariadb: CONNECT storage engine heap-based buffer overflow
  • BZ - 2068233 - CVE-2022-24051 mariadb: lack of proper validation of a user-supplied string before using it as a format specifier
  • BZ - 2068234 - CVE-2022-24048 mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer
  • BZ - 2069833 - CVE-2022-24050 mariadb: lack of validating the existence of an object prior to performing operations on the object
  • BZ - 2074817 - CVE-2022-27376 mariadb: assertion failure in Item_args::walk_arg
  • BZ - 2074947 - CVE-2022-27377 mariadb: use-after-poison when complex conversion is involved in blob
  • BZ - 2074949 - CVE-2022-27378 mariadb: server crash in create_tmp_table::finalize
  • BZ - 2074951 - CVE-2022-27379 mariadb: server crash in component arg_comparator::compare_real_fixed
  • BZ - 2074966 - CVE-2022-27380 mariadb: server crash at my_decimal::operator=
  • BZ - 2074981 - CVE-2022-27381 mariadb: server crash at Field::set_default via specially crafted SQL statements
  • BZ - 2074987 - CVE-2022-27382 mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order
  • BZ - 2074996 - CVE-2022-27383 mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c
  • BZ - 2074999 - CVE-2022-27384 mariadb: crash via component Item_subselect::init_expr_cache_tracker
  • BZ - 2075005 - CVE-2022-27386 mariadb: server crashes in query_arena::set_query_arena upon SELECT from view
  • BZ - 2075006 - CVE-2022-27387 mariadb: assertion failures in decimal_bin_size
  • BZ - 2075691 - CVE-2022-27445 mariadb: assertion failure in compare_order_elements
  • BZ - 2075692 - CVE-2022-27446 mariadb: crash when using HAVING with IS NULL predicate in an equality
  • BZ - 2075693 - CVE-2022-27447 mariadb: use-after-poison in Binary_string::free_buffer
  • BZ - 2075694 - CVE-2022-27448 mariadb: crash in multi-update and implicit grouping
  • BZ - 2075695 - CVE-2022-27449 mariadb: assertion failure in sql/item_func.cc
  • BZ - 2075696 - CVE-2022-27444 mariadb: crash when using HAVING with NOT EXIST predicate in an equality
  • BZ - 2075697 - CVE-2022-27456 mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc
  • BZ - 2075699 - CVE-2022-27457 mariadb: incorrect key in “dup value” error after long unique
  • BZ - 2075700 - CVE-2022-27458 mariadb: use-after-poison in Binary_string::free_buffer
  • BZ - 2075701 - CVE-2022-27455 mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING
  • BZ - 2076144 - CVE-2022-27451 mariadb: crash via window function in expression in ORDER BY
  • BZ - 2076145 - CVE-2022-27452 mariadb: assertion failure in sql/item_cmpfunc.cc
  • BZ - 2092354 - CVE-2022-31622 mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc
  • BZ - 2092360 - CVE-2022-31623 mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc
  • BZ - 2095290 - DROP TABLE doesn’t raise error while dropping non-existing table in MariaDB 10.5.9 when OQGraph SE is loaded to the server [rhel-8.6.0.z]
  • BZ - 2096281 - [Tracker] Rebase to MariaDB 10.5.16 [rhel-8.6.0.z]
  • BZ - 2096934 - Don’t use less parallelism if not necessary [rhel-8.6.0.z]
  • BZ - 2096935 - Links in galera package description are bad [rhel-8.6.0.z]
  • BZ - 2096936 - [Tracker] Rebase to Galera 26.4.11 [rhel-8.6.0.z]

CVEs

  • CVE-2021-46659
  • CVE-2021-46661
  • CVE-2021-46663
  • CVE-2021-46664
  • CVE-2021-46665
  • CVE-2021-46668
  • CVE-2021-46669
  • CVE-2022-24048
  • CVE-2022-24050
  • CVE-2022-24051
  • CVE-2022-24052
  • CVE-2022-27376
  • CVE-2022-27377
  • CVE-2022-27378
  • CVE-2022-27379
  • CVE-2022-27380
  • CVE-2022-27381
  • CVE-2022-27382
  • CVE-2022-27383
  • CVE-2022-27384
  • CVE-2022-27386
  • CVE-2022-27387
  • CVE-2022-27444
  • CVE-2022-27445
  • CVE-2022-27446
  • CVE-2022-27447
  • CVE-2022-27448
  • CVE-2022-27449
  • CVE-2022-27451
  • CVE-2022-27452
  • CVE-2022-27455
  • CVE-2022-27456
  • CVE-2022-27457
  • CVE-2022-27458
  • CVE-2022-31622
  • CVE-2022-31623

Red Hat Enterprise Linux for x86_64 8

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

x86_64

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: 7fb70d2a30cddc57c57c62c1ccc697193817430f0012136a6d265aeabe2a7fc2

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b94c919cd2d750b91e615660bf6c48ebe4d0c97d270d6fa8a5ce3fe708cf0db5

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b611108a8273edc2b620ca172984f9cb69da81452eed55e5b2d7667fc54363f2

galera-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 434908e502acc5e61b50baae7999450f3b267f5e24a0199d20b24912cd40ce26

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2c1905f4c00a5983af21198eda6027176acbc9a26dd7fd56415974c9b323e8d0

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 42744bd3887500230bd53a5c71d61c9f3e5a5110b207b172e3ca2f48003aa66c

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 6b4505965d454c7671d63d312ed9c974f24523b1770aacc798aa62e19d6e6f7e

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 21a1aed3ba05eb0207db1e0e64a2817e516e049d26a1d3a47feb296fe6bb0454

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: bedb282725e411e16847ee4fc9124289b9e8f1a609b9f0592d33dc850ad752b3

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: d8d2df406680a4ead7b116ade4b5148df9e27a740c70c295ce0e0644821b0dcf

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: aa6c5755f4715328195d004489dac0de45d91ab7680a6dbc14e380b7b923b2f7

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 8deb531556d298a0d8b8cbbebb59bb7a0ed555aaebdc40ce3b4375593f0f8eaa

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c6c58c39292e9a2a695e1bbb1559977d4cf8235a1b10c052a2a5a9ba091b9ac3

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 0d7a2cf6453ab248400ee2f1cdd8b45dc4b4ccbf5dbacf5d5e287c1ca6e9e7c0

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9a4487dcd74f47f22e343a79b8cff25dc2b39d20e532d83777cc4f42776b49e4

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 339f79f8d032ec3c5c1f17285acd116e4b9be9d7c1eb0beb5dd338d9a33ce537

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 550f3fe92062d82d00932c8af820e633141496341926e7a816240d9f3704d213

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2f8b7380b4bfd39cb580b4a38f1e503f7cb417b7788dee47446fa007517bbc85

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a7341aa7c15e90adc0df71ba51d58962bd658f31b3be1a86a2dd4d230e9e8533

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c8cd283177a9f51540c41d2f80c8fa49780b0138f2cc5058c4e190f9358e38a1

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f2b414d83d8493cddda8ec905f1315dd0c47f80c079e0b156a9f7313dec61a3

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 563e5bfb37504da8efadc4a74ec43a9b3e4537821abaa565c699bb3b7048f051

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: fe2924188de0da9243c561da2ef77259c9f164eb79788a3670cc28d22704fa9a

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 08bb15263b716c089ca2462f9443de228b9f1412fa6f4db02e7bbf4b2e51e54d

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7d233c9c42e6577a31ec460edc52238f9d4f94912ceff62dc2b61c9ef78007f4

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9b73242aac3e82f74df376626178ce94f9146524f2a2542434c3f027f59101b7

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: e2d1640d8fa34d58c7c580d098395dd084399f53fee4171dfe1ff6e2cc169fa9

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: dc01698e6e6c280d32be17b57b9ea3d8b4637180ae7f010b701ee9412bfe5ef0

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a9e26e810877ba3da4675c12a5f08fcff96a9ef3893a83254f81f6b675a338b2

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f905c8d8dd616e64a0e3f12835c5a77a9d1eddfb995f47720d0ff1413c24c13

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

x86_64

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: 7fb70d2a30cddc57c57c62c1ccc697193817430f0012136a6d265aeabe2a7fc2

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b94c919cd2d750b91e615660bf6c48ebe4d0c97d270d6fa8a5ce3fe708cf0db5

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b611108a8273edc2b620ca172984f9cb69da81452eed55e5b2d7667fc54363f2

galera-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 434908e502acc5e61b50baae7999450f3b267f5e24a0199d20b24912cd40ce26

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2c1905f4c00a5983af21198eda6027176acbc9a26dd7fd56415974c9b323e8d0

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 42744bd3887500230bd53a5c71d61c9f3e5a5110b207b172e3ca2f48003aa66c

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 6b4505965d454c7671d63d312ed9c974f24523b1770aacc798aa62e19d6e6f7e

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 21a1aed3ba05eb0207db1e0e64a2817e516e049d26a1d3a47feb296fe6bb0454

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: bedb282725e411e16847ee4fc9124289b9e8f1a609b9f0592d33dc850ad752b3

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: d8d2df406680a4ead7b116ade4b5148df9e27a740c70c295ce0e0644821b0dcf

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: aa6c5755f4715328195d004489dac0de45d91ab7680a6dbc14e380b7b923b2f7

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 8deb531556d298a0d8b8cbbebb59bb7a0ed555aaebdc40ce3b4375593f0f8eaa

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c6c58c39292e9a2a695e1bbb1559977d4cf8235a1b10c052a2a5a9ba091b9ac3

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 0d7a2cf6453ab248400ee2f1cdd8b45dc4b4ccbf5dbacf5d5e287c1ca6e9e7c0

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9a4487dcd74f47f22e343a79b8cff25dc2b39d20e532d83777cc4f42776b49e4

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 339f79f8d032ec3c5c1f17285acd116e4b9be9d7c1eb0beb5dd338d9a33ce537

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 550f3fe92062d82d00932c8af820e633141496341926e7a816240d9f3704d213

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2f8b7380b4bfd39cb580b4a38f1e503f7cb417b7788dee47446fa007517bbc85

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a7341aa7c15e90adc0df71ba51d58962bd658f31b3be1a86a2dd4d230e9e8533

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c8cd283177a9f51540c41d2f80c8fa49780b0138f2cc5058c4e190f9358e38a1

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f2b414d83d8493cddda8ec905f1315dd0c47f80c079e0b156a9f7313dec61a3

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 563e5bfb37504da8efadc4a74ec43a9b3e4537821abaa565c699bb3b7048f051

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: fe2924188de0da9243c561da2ef77259c9f164eb79788a3670cc28d22704fa9a

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 08bb15263b716c089ca2462f9443de228b9f1412fa6f4db02e7bbf4b2e51e54d

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7d233c9c42e6577a31ec460edc52238f9d4f94912ceff62dc2b61c9ef78007f4

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9b73242aac3e82f74df376626178ce94f9146524f2a2542434c3f027f59101b7

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: e2d1640d8fa34d58c7c580d098395dd084399f53fee4171dfe1ff6e2cc169fa9

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: dc01698e6e6c280d32be17b57b9ea3d8b4637180ae7f010b701ee9412bfe5ef0

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a9e26e810877ba3da4675c12a5f08fcff96a9ef3893a83254f81f6b675a338b2

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f905c8d8dd616e64a0e3f12835c5a77a9d1eddfb995f47720d0ff1413c24c13

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

x86_64

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: 7fb70d2a30cddc57c57c62c1ccc697193817430f0012136a6d265aeabe2a7fc2

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b94c919cd2d750b91e615660bf6c48ebe4d0c97d270d6fa8a5ce3fe708cf0db5

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b611108a8273edc2b620ca172984f9cb69da81452eed55e5b2d7667fc54363f2

galera-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 434908e502acc5e61b50baae7999450f3b267f5e24a0199d20b24912cd40ce26

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2c1905f4c00a5983af21198eda6027176acbc9a26dd7fd56415974c9b323e8d0

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 42744bd3887500230bd53a5c71d61c9f3e5a5110b207b172e3ca2f48003aa66c

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 6b4505965d454c7671d63d312ed9c974f24523b1770aacc798aa62e19d6e6f7e

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 21a1aed3ba05eb0207db1e0e64a2817e516e049d26a1d3a47feb296fe6bb0454

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: bedb282725e411e16847ee4fc9124289b9e8f1a609b9f0592d33dc850ad752b3

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: d8d2df406680a4ead7b116ade4b5148df9e27a740c70c295ce0e0644821b0dcf

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: aa6c5755f4715328195d004489dac0de45d91ab7680a6dbc14e380b7b923b2f7

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 8deb531556d298a0d8b8cbbebb59bb7a0ed555aaebdc40ce3b4375593f0f8eaa

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c6c58c39292e9a2a695e1bbb1559977d4cf8235a1b10c052a2a5a9ba091b9ac3

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 0d7a2cf6453ab248400ee2f1cdd8b45dc4b4ccbf5dbacf5d5e287c1ca6e9e7c0

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9a4487dcd74f47f22e343a79b8cff25dc2b39d20e532d83777cc4f42776b49e4

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 339f79f8d032ec3c5c1f17285acd116e4b9be9d7c1eb0beb5dd338d9a33ce537

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 550f3fe92062d82d00932c8af820e633141496341926e7a816240d9f3704d213

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2f8b7380b4bfd39cb580b4a38f1e503f7cb417b7788dee47446fa007517bbc85

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a7341aa7c15e90adc0df71ba51d58962bd658f31b3be1a86a2dd4d230e9e8533

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c8cd283177a9f51540c41d2f80c8fa49780b0138f2cc5058c4e190f9358e38a1

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f2b414d83d8493cddda8ec905f1315dd0c47f80c079e0b156a9f7313dec61a3

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 563e5bfb37504da8efadc4a74ec43a9b3e4537821abaa565c699bb3b7048f051

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: fe2924188de0da9243c561da2ef77259c9f164eb79788a3670cc28d22704fa9a

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 08bb15263b716c089ca2462f9443de228b9f1412fa6f4db02e7bbf4b2e51e54d

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7d233c9c42e6577a31ec460edc52238f9d4f94912ceff62dc2b61c9ef78007f4

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9b73242aac3e82f74df376626178ce94f9146524f2a2542434c3f027f59101b7

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: e2d1640d8fa34d58c7c580d098395dd084399f53fee4171dfe1ff6e2cc169fa9

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: dc01698e6e6c280d32be17b57b9ea3d8b4637180ae7f010b701ee9412bfe5ef0

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a9e26e810877ba3da4675c12a5f08fcff96a9ef3893a83254f81f6b675a338b2

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f905c8d8dd616e64a0e3f12835c5a77a9d1eddfb995f47720d0ff1413c24c13

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

s390x

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.s390x.rpm

SHA-256: 03e35a861801b4ec47b309ed524444402c2b0c6799b32b7d59ebbe501d81f1e3

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.s390x.rpm

SHA-256: 8d3eaaac221531919074237fb7cdc44e8ab864a5184bbc044661274844277ea7

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.s390x.rpm

SHA-256: f7deca00bc076691b6be6546e1b9dba528d6cac02b5f13c613ef60929f8b67bf

galera-26.4.11-1.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: d948cbcac9a584e07916fae8321bb6e8ff11cd4c2e067568fd4f750c962b7841

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: f3c854497cb28f115c15847f979893b69d64b167c1f89acda14e359562803396

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 1c10248f6f66f3594aeafa5db6ef05302541da39e69bd859e21639412ad8cc4f

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 32d670aba2d2a9c80d28657c3d89cec379ce32fa94c9b2948b065d71fd4d324c

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 49115080a9b8f6fbd15c82832564770354653254393fddf371280cb0e3d28978

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 2841da4180072bd440e3f8819ca415f53844f43f37bb3d8aad6dc8f45411618e

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: bedcb9b29e5fece079e0b1c42c4cdf033dcad5b2647999bf53779df5fbab324a

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 5af20898ba812243895042bd9f1d53416c3bdbd4eda24ba767f3008306b075d3

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: a9a91ee1ddf3e8566946232c9c3414160f447ff67398ffd6351f41ae7717543e

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: fbe250b23b12788f1a76fa3c1bde84c1d393fa201eee1bff457c853f4fbc350f

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: b9f3921ba44f47c2985eadd6f51a9a5865081e95080338fa6b5ee4447417c321

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 01b343dc48f46958c4e5a331143a198bc5d5508f4398e7d4b7d7e919a835e729

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 60e61d24ccdef559b1e0bdb2905996993c36ad26d774ab8e1cdc5a7a3c322019

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 62afd94aebfdec3f9a5cd7855a59e3818265adb3f04f81329d830daf1de5284c

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 43240e0e8b13aae2404e4ee895d9221d99ce375c4dc43d37ec3cc7832df56c9d

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 0d01a04f57c6d1f4fe8fdab1b8eb75da5900c50362b9c1540c77721d99416b7d

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: f772d9c8955c79c51a1d9b8a94ae2346bbede57aea41e97021ec6b49e6f9c001

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 3c39977647ee33719adea20577058732fb8dd894f742715de5591e72c084b0eb

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 0f12778c12fb55141ad5e7da808f9929edddb16f747c5b50282e5f42a0a409fa

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: b6e01b04f918c7314a03b988dfb37090828e568c3e882c99174d6749488d6b28

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: c69dfaed8dd535868ac3a06e1cba8131d00fa09f9acd93d62518bbfcf6d3ac15

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: feb88d0638fd4663db8156ef5c802ba52376446036f255a90ae894238f123cb9

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 24b909148a78e70e348d23ce9c68c82ca9e92014bc4ef44202d8007993cf16ff

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: e590ea552d3b01e66c782407780afdb4b1fff21757bcf3e78b186a1d35461385

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: e0c35b6e0a76cf5c292c660225ec725befc55034894967a08b0fb07e5d6a7927

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 0e7e8829947ca39a524528719af73fbe17650a40a3e58e7ea732fa858ad6ecf0

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 94a9b4a2449370ad07a7803c158fc719f7ab4a71ee334eaefbd47f7431aa9216

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

s390x

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.s390x.rpm

SHA-256: 03e35a861801b4ec47b309ed524444402c2b0c6799b32b7d59ebbe501d81f1e3

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.s390x.rpm

SHA-256: 8d3eaaac221531919074237fb7cdc44e8ab864a5184bbc044661274844277ea7

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.s390x.rpm

SHA-256: f7deca00bc076691b6be6546e1b9dba528d6cac02b5f13c613ef60929f8b67bf

galera-26.4.11-1.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: d948cbcac9a584e07916fae8321bb6e8ff11cd4c2e067568fd4f750c962b7841

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: f3c854497cb28f115c15847f979893b69d64b167c1f89acda14e359562803396

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 1c10248f6f66f3594aeafa5db6ef05302541da39e69bd859e21639412ad8cc4f

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 32d670aba2d2a9c80d28657c3d89cec379ce32fa94c9b2948b065d71fd4d324c

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 49115080a9b8f6fbd15c82832564770354653254393fddf371280cb0e3d28978

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 2841da4180072bd440e3f8819ca415f53844f43f37bb3d8aad6dc8f45411618e

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: bedcb9b29e5fece079e0b1c42c4cdf033dcad5b2647999bf53779df5fbab324a

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 5af20898ba812243895042bd9f1d53416c3bdbd4eda24ba767f3008306b075d3

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: a9a91ee1ddf3e8566946232c9c3414160f447ff67398ffd6351f41ae7717543e

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: fbe250b23b12788f1a76fa3c1bde84c1d393fa201eee1bff457c853f4fbc350f

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: b9f3921ba44f47c2985eadd6f51a9a5865081e95080338fa6b5ee4447417c321

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 01b343dc48f46958c4e5a331143a198bc5d5508f4398e7d4b7d7e919a835e729

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 60e61d24ccdef559b1e0bdb2905996993c36ad26d774ab8e1cdc5a7a3c322019

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 62afd94aebfdec3f9a5cd7855a59e3818265adb3f04f81329d830daf1de5284c

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 43240e0e8b13aae2404e4ee895d9221d99ce375c4dc43d37ec3cc7832df56c9d

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 0d01a04f57c6d1f4fe8fdab1b8eb75da5900c50362b9c1540c77721d99416b7d

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: f772d9c8955c79c51a1d9b8a94ae2346bbede57aea41e97021ec6b49e6f9c001

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 3c39977647ee33719adea20577058732fb8dd894f742715de5591e72c084b0eb

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 0f12778c12fb55141ad5e7da808f9929edddb16f747c5b50282e5f42a0a409fa

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: b6e01b04f918c7314a03b988dfb37090828e568c3e882c99174d6749488d6b28

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: c69dfaed8dd535868ac3a06e1cba8131d00fa09f9acd93d62518bbfcf6d3ac15

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: feb88d0638fd4663db8156ef5c802ba52376446036f255a90ae894238f123cb9

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 24b909148a78e70e348d23ce9c68c82ca9e92014bc4ef44202d8007993cf16ff

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: e590ea552d3b01e66c782407780afdb4b1fff21757bcf3e78b186a1d35461385

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: e0c35b6e0a76cf5c292c660225ec725befc55034894967a08b0fb07e5d6a7927

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 0e7e8829947ca39a524528719af73fbe17650a40a3e58e7ea732fa858ad6ecf0

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.s390x.rpm

SHA-256: 94a9b4a2449370ad07a7803c158fc719f7ab4a71ee334eaefbd47f7431aa9216

Red Hat Enterprise Linux for Power, little endian 8

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

ppc64le

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: 0f88292e7485df461bbb8166aaa43ac0372d42b3707777e2e14f4cfb7b9333a7

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: 6307d3f61d90f2a4aaddbc2af0f9b56e89db47c32e61bd1c465b7e0ab6ab4479

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: b5f152996c274ca1417d0801834f833372b0be97956b6cbc07e41398f1fb15bf

galera-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 48087b1004a5e1770c00607c102151dd49794dd4100630883b17dfb074f7f78f

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 495679eba0010506eeeb10229b7a2abe59a0548f6762c4a1b288bab1be8cceb5

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a55f6b07443628cb1d19721f5e43cb99d184312b6bb16fde22982606faf098d2

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 6924882378990b6d183243e3c70d434319cb0ee728fe9dcfebb90c6c03260607

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 932608e5ee23298c61f893eba4678981c1e11935f53e25534ed7ddff26513caa

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 7e1cc9c5b19a44dcd0fd51a39b8a8ee03bf7289c60fea3c1bae96c785e761645

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d786aa0732d07cbeda50eb996725cc40548c5465be23cb58843e54040a044fc0

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 26f51b72369fb10f39be8cd52111c20e0c72433fcca205192534122a3d46ddf6

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 4711af128bd6eea9ea2df0b09ab7e163a4e4e6c572af379a158ade0eb294cfb8

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 2fcf63a127fa347038ac5ae9ef0c605413cae62388396f5f8c7515ce3286a9ea

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a052530d0d24ae0e1ab262313c21094d8809ee831fd44813ed625e1393293d27

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 254929166f61832a241de3439f7050e5c37afe3f9cc6ed59de34e96b8485ad2a

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a65a30d9819cc39fdfe9b6a2df8ff5b485c5b0042d6cf7859028c83cd35f8751

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: f4d1cf5a156e787e8f0fb8b5a676b6c05be551d6cf2a599e543ae106a7f36405

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d7dd213fafc6f2eebeeb1fecabe5a311995e6b3b9cfb3fc74751badce2571eb4

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: b0589095909d01d88939eee42c7fe8b46f8517cc3c85f834bc9c5b443e99400d

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: bc3c946e13f3b97a560798e1aee414a2802f3dc399a3f17509140f60796ee694

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d54160832eee842097daee819c850df8634df3f19b666b4b8e9177d7e1332bb4

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 3bc8eb3d28afb89fbcb4c246bc1b25ca2b704f5ac9c32d23a612c4e30fd29755

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dfb58508f07196c9d68b14c841ea3dd0b66cb567c8d1b2a36c7ae93c4fb0c1bd

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 3213ebed37a842d461a066f7de6dd22ee97099b0e132437e15558e3badf5e5c4

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dd62cd9b516f90c03379d35050218885a44efae07dd6d1ab3c0b8606539dcb7e

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: ce3679712529b4d09dff6fbd6b282f8d0c6a34472e09cc05406148ac33afd2a3

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 80f5afbd27fc0064474f11f7e332872d1d5713d362d7c63dcb41c284713da00b

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: eeaca9b6b2fd1cd6bf34937fb34416dcd95c68a9b13964597ca483adfa996e51

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dcd7fc996219d181e0f72a2852389248b9ed436fbd14841fb58c8f2c2ebab2c8

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 0c74b3e6911b31946cd1ac78cbe3352172d8d67920d3cea45c9c9c3b625b745d

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

ppc64le

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: 0f88292e7485df461bbb8166aaa43ac0372d42b3707777e2e14f4cfb7b9333a7

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: 6307d3f61d90f2a4aaddbc2af0f9b56e89db47c32e61bd1c465b7e0ab6ab4479

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: b5f152996c274ca1417d0801834f833372b0be97956b6cbc07e41398f1fb15bf

galera-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 48087b1004a5e1770c00607c102151dd49794dd4100630883b17dfb074f7f78f

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 495679eba0010506eeeb10229b7a2abe59a0548f6762c4a1b288bab1be8cceb5

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a55f6b07443628cb1d19721f5e43cb99d184312b6bb16fde22982606faf098d2

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 6924882378990b6d183243e3c70d434319cb0ee728fe9dcfebb90c6c03260607

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 932608e5ee23298c61f893eba4678981c1e11935f53e25534ed7ddff26513caa

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 7e1cc9c5b19a44dcd0fd51a39b8a8ee03bf7289c60fea3c1bae96c785e761645

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d786aa0732d07cbeda50eb996725cc40548c5465be23cb58843e54040a044fc0

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 26f51b72369fb10f39be8cd52111c20e0c72433fcca205192534122a3d46ddf6

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 4711af128bd6eea9ea2df0b09ab7e163a4e4e6c572af379a158ade0eb294cfb8

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 2fcf63a127fa347038ac5ae9ef0c605413cae62388396f5f8c7515ce3286a9ea

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a052530d0d24ae0e1ab262313c21094d8809ee831fd44813ed625e1393293d27

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 254929166f61832a241de3439f7050e5c37afe3f9cc6ed59de34e96b8485ad2a

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a65a30d9819cc39fdfe9b6a2df8ff5b485c5b0042d6cf7859028c83cd35f8751

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: f4d1cf5a156e787e8f0fb8b5a676b6c05be551d6cf2a599e543ae106a7f36405

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d7dd213fafc6f2eebeeb1fecabe5a311995e6b3b9cfb3fc74751badce2571eb4

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: b0589095909d01d88939eee42c7fe8b46f8517cc3c85f834bc9c5b443e99400d

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: bc3c946e13f3b97a560798e1aee414a2802f3dc399a3f17509140f60796ee694

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d54160832eee842097daee819c850df8634df3f19b666b4b8e9177d7e1332bb4

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 3bc8eb3d28afb89fbcb4c246bc1b25ca2b704f5ac9c32d23a612c4e30fd29755

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dfb58508f07196c9d68b14c841ea3dd0b66cb567c8d1b2a36c7ae93c4fb0c1bd

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 3213ebed37a842d461a066f7de6dd22ee97099b0e132437e15558e3badf5e5c4

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dd62cd9b516f90c03379d35050218885a44efae07dd6d1ab3c0b8606539dcb7e

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: ce3679712529b4d09dff6fbd6b282f8d0c6a34472e09cc05406148ac33afd2a3

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 80f5afbd27fc0064474f11f7e332872d1d5713d362d7c63dcb41c284713da00b

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: eeaca9b6b2fd1cd6bf34937fb34416dcd95c68a9b13964597ca483adfa996e51

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dcd7fc996219d181e0f72a2852389248b9ed436fbd14841fb58c8f2c2ebab2c8

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 0c74b3e6911b31946cd1ac78cbe3352172d8d67920d3cea45c9c9c3b625b745d

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

x86_64

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: 7fb70d2a30cddc57c57c62c1ccc697193817430f0012136a6d265aeabe2a7fc2

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b94c919cd2d750b91e615660bf6c48ebe4d0c97d270d6fa8a5ce3fe708cf0db5

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b611108a8273edc2b620ca172984f9cb69da81452eed55e5b2d7667fc54363f2

galera-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 434908e502acc5e61b50baae7999450f3b267f5e24a0199d20b24912cd40ce26

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2c1905f4c00a5983af21198eda6027176acbc9a26dd7fd56415974c9b323e8d0

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 42744bd3887500230bd53a5c71d61c9f3e5a5110b207b172e3ca2f48003aa66c

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 6b4505965d454c7671d63d312ed9c974f24523b1770aacc798aa62e19d6e6f7e

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 21a1aed3ba05eb0207db1e0e64a2817e516e049d26a1d3a47feb296fe6bb0454

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: bedb282725e411e16847ee4fc9124289b9e8f1a609b9f0592d33dc850ad752b3

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: d8d2df406680a4ead7b116ade4b5148df9e27a740c70c295ce0e0644821b0dcf

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: aa6c5755f4715328195d004489dac0de45d91ab7680a6dbc14e380b7b923b2f7

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 8deb531556d298a0d8b8cbbebb59bb7a0ed555aaebdc40ce3b4375593f0f8eaa

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c6c58c39292e9a2a695e1bbb1559977d4cf8235a1b10c052a2a5a9ba091b9ac3

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 0d7a2cf6453ab248400ee2f1cdd8b45dc4b4ccbf5dbacf5d5e287c1ca6e9e7c0

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9a4487dcd74f47f22e343a79b8cff25dc2b39d20e532d83777cc4f42776b49e4

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 339f79f8d032ec3c5c1f17285acd116e4b9be9d7c1eb0beb5dd338d9a33ce537

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 550f3fe92062d82d00932c8af820e633141496341926e7a816240d9f3704d213

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2f8b7380b4bfd39cb580b4a38f1e503f7cb417b7788dee47446fa007517bbc85

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a7341aa7c15e90adc0df71ba51d58962bd658f31b3be1a86a2dd4d230e9e8533

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c8cd283177a9f51540c41d2f80c8fa49780b0138f2cc5058c4e190f9358e38a1

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f2b414d83d8493cddda8ec905f1315dd0c47f80c079e0b156a9f7313dec61a3

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 563e5bfb37504da8efadc4a74ec43a9b3e4537821abaa565c699bb3b7048f051

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: fe2924188de0da9243c561da2ef77259c9f164eb79788a3670cc28d22704fa9a

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 08bb15263b716c089ca2462f9443de228b9f1412fa6f4db02e7bbf4b2e51e54d

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7d233c9c42e6577a31ec460edc52238f9d4f94912ceff62dc2b61c9ef78007f4

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9b73242aac3e82f74df376626178ce94f9146524f2a2542434c3f027f59101b7

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: e2d1640d8fa34d58c7c580d098395dd084399f53fee4171dfe1ff6e2cc169fa9

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: dc01698e6e6c280d32be17b57b9ea3d8b4637180ae7f010b701ee9412bfe5ef0

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a9e26e810877ba3da4675c12a5f08fcff96a9ef3893a83254f81f6b675a338b2

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f905c8d8dd616e64a0e3f12835c5a77a9d1eddfb995f47720d0ff1413c24c13

Red Hat Enterprise Linux for ARM 64 8

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

aarch64

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.aarch64.rpm

SHA-256: fbfec1c40e691b3c94a23d43407ed0a2bcd13ff9b4408f0d304bf15bbff359b2

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.aarch64.rpm

SHA-256: dabf0306de920352aa096deedeb3a841ee24259b84c9267b0d16bfbd6064a3ca

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.aarch64.rpm

SHA-256: 817e8a86d6961555ae30b6d21ff5adf9e7e756b4b1221be8b67db96470b4caf4

galera-26.4.11-1.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: e442e70e119889db0fdb9bc0e7f47d6de32b20bd862fc44bded6c300afbfef4b

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: a4320bea9bff2c3dd87b7d93b0a9c194b9638b06c8f4b3833dc97428384e093a

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: f578c7b8484bcd5fc67b237f0cbd5dd90aefcd9b12e47ed4b4eb651cd67dffe3

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 6af3bea67b5bf8267a04364ec276b505262015212e11a3ce9b4d81afe4c01767

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 066b820545058b53fd30223f8d1426ec7b4ecca203bc286862ddf46e4b7915cb

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: cb0a8efd97640f0c363ed9b5871438869cb27db79d7904a5b0aa5f3211db3490

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 1af634d35c8da4c61c6523171b0165bf1ca9348dd3ea012db0bb787be348e7fb

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 078bf071b122be983db1d3ac40f778786503bb14f84aeb102e1a9b650b78d3b7

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: bb1a94ee4b3e9d5e151cda515a0f619c27710797811d2a313f3ee4158de8d51b

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 1884859deed1436f21cb49f5ffdccfd949f7084beff069a523bc5e0d68e1c4bb

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: b0b41c90fbb96da3645fe6cfdc5588050d2ee7f687169964b8d2a6f03ccd15a7

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 68e47abc22c8d4d12d62995a29d7780bd78aedcab4af1b4e007b2ed4ef8ce6fa

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 36a1ef71b68d24405ba23db91b6d60457f8298b5eaab3561a86cb386b1d6dabd

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 1782fb1ef659eff30dfa9938d76997d0673d70cf435728dafee40961ba814f9f

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 7450c177b88b962df772b0f0ef4a6cfa2239f0fd151b5d5c30932212c022715e

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 476fba7620dea6816225699ee866edf87e14095dd22925a30910411fe637a594

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: d510f00deb8d67506926aaef24d135d0ed3f78a2a9f59fb2d8fa3639b6a84126

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 9740cbda616ab3afd01ee443b10bcd48c8f39a0d8368f4f3dc717c3e1b93c544

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 4d5851f2e50009ee09202b6bbffcf30642188061c129170e7b4a08502a9c1421

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: b04d3ce814e0a190520eeb41521b72665a765678b91924221190d279f63422bd

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 54c2f0c68181507062b5a987213b1161705e0f6dcfff7be3744b618ea22828a9

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 192b05291eee9a541b761ea2b350f47f0c65b4fcb4489c005a85ac05012c51ea

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 82a66005486e1857a1884d45d9607df67a4eb574e0d48d84c13f5cfd58bf92c4

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 73726a5b097999057fc242d5ea6a7142587f59a9ac9fde0c79f2a411d51ee6c5

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: d71ceac233c63be02a0f9b86317f2be42f0d3cea7a0dabb875f81f8afdd5525a

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 87f90662ba4c773c99f337df84d54953d0b3a4c3f065f335149b5ecec8027c56

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: b71819e1aa84b91426b8e81f4b16b284822c2cbdb01505cb3725fadc40ca9387

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

aarch64

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.aarch64.rpm

SHA-256: fbfec1c40e691b3c94a23d43407ed0a2bcd13ff9b4408f0d304bf15bbff359b2

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.aarch64.rpm

SHA-256: dabf0306de920352aa096deedeb3a841ee24259b84c9267b0d16bfbd6064a3ca

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.aarch64.rpm

SHA-256: 817e8a86d6961555ae30b6d21ff5adf9e7e756b4b1221be8b67db96470b4caf4

galera-26.4.11-1.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: e442e70e119889db0fdb9bc0e7f47d6de32b20bd862fc44bded6c300afbfef4b

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: a4320bea9bff2c3dd87b7d93b0a9c194b9638b06c8f4b3833dc97428384e093a

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: f578c7b8484bcd5fc67b237f0cbd5dd90aefcd9b12e47ed4b4eb651cd67dffe3

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 6af3bea67b5bf8267a04364ec276b505262015212e11a3ce9b4d81afe4c01767

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 066b820545058b53fd30223f8d1426ec7b4ecca203bc286862ddf46e4b7915cb

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: cb0a8efd97640f0c363ed9b5871438869cb27db79d7904a5b0aa5f3211db3490

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 1af634d35c8da4c61c6523171b0165bf1ca9348dd3ea012db0bb787be348e7fb

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 078bf071b122be983db1d3ac40f778786503bb14f84aeb102e1a9b650b78d3b7

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: bb1a94ee4b3e9d5e151cda515a0f619c27710797811d2a313f3ee4158de8d51b

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 1884859deed1436f21cb49f5ffdccfd949f7084beff069a523bc5e0d68e1c4bb

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: b0b41c90fbb96da3645fe6cfdc5588050d2ee7f687169964b8d2a6f03ccd15a7

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 68e47abc22c8d4d12d62995a29d7780bd78aedcab4af1b4e007b2ed4ef8ce6fa

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 36a1ef71b68d24405ba23db91b6d60457f8298b5eaab3561a86cb386b1d6dabd

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 1782fb1ef659eff30dfa9938d76997d0673d70cf435728dafee40961ba814f9f

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 7450c177b88b962df772b0f0ef4a6cfa2239f0fd151b5d5c30932212c022715e

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 476fba7620dea6816225699ee866edf87e14095dd22925a30910411fe637a594

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: d510f00deb8d67506926aaef24d135d0ed3f78a2a9f59fb2d8fa3639b6a84126

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 9740cbda616ab3afd01ee443b10bcd48c8f39a0d8368f4f3dc717c3e1b93c544

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 4d5851f2e50009ee09202b6bbffcf30642188061c129170e7b4a08502a9c1421

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: b04d3ce814e0a190520eeb41521b72665a765678b91924221190d279f63422bd

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 54c2f0c68181507062b5a987213b1161705e0f6dcfff7be3744b618ea22828a9

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 192b05291eee9a541b761ea2b350f47f0c65b4fcb4489c005a85ac05012c51ea

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 82a66005486e1857a1884d45d9607df67a4eb574e0d48d84c13f5cfd58bf92c4

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 73726a5b097999057fc242d5ea6a7142587f59a9ac9fde0c79f2a411d51ee6c5

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: d71ceac233c63be02a0f9b86317f2be42f0d3cea7a0dabb875f81f8afdd5525a

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: 87f90662ba4c773c99f337df84d54953d0b3a4c3f065f335149b5ecec8027c56

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.aarch64.rpm

SHA-256: b71819e1aa84b91426b8e81f4b16b284822c2cbdb01505cb3725fadc40ca9387

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

ppc64le

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: 0f88292e7485df461bbb8166aaa43ac0372d42b3707777e2e14f4cfb7b9333a7

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: 6307d3f61d90f2a4aaddbc2af0f9b56e89db47c32e61bd1c465b7e0ab6ab4479

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.ppc64le.rpm

SHA-256: b5f152996c274ca1417d0801834f833372b0be97956b6cbc07e41398f1fb15bf

galera-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 48087b1004a5e1770c00607c102151dd49794dd4100630883b17dfb074f7f78f

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 495679eba0010506eeeb10229b7a2abe59a0548f6762c4a1b288bab1be8cceb5

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a55f6b07443628cb1d19721f5e43cb99d184312b6bb16fde22982606faf098d2

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 6924882378990b6d183243e3c70d434319cb0ee728fe9dcfebb90c6c03260607

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 932608e5ee23298c61f893eba4678981c1e11935f53e25534ed7ddff26513caa

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 7e1cc9c5b19a44dcd0fd51a39b8a8ee03bf7289c60fea3c1bae96c785e761645

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d786aa0732d07cbeda50eb996725cc40548c5465be23cb58843e54040a044fc0

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 26f51b72369fb10f39be8cd52111c20e0c72433fcca205192534122a3d46ddf6

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 4711af128bd6eea9ea2df0b09ab7e163a4e4e6c572af379a158ade0eb294cfb8

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 2fcf63a127fa347038ac5ae9ef0c605413cae62388396f5f8c7515ce3286a9ea

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a052530d0d24ae0e1ab262313c21094d8809ee831fd44813ed625e1393293d27

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 254929166f61832a241de3439f7050e5c37afe3f9cc6ed59de34e96b8485ad2a

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: a65a30d9819cc39fdfe9b6a2df8ff5b485c5b0042d6cf7859028c83cd35f8751

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: f4d1cf5a156e787e8f0fb8b5a676b6c05be551d6cf2a599e543ae106a7f36405

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d7dd213fafc6f2eebeeb1fecabe5a311995e6b3b9cfb3fc74751badce2571eb4

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: b0589095909d01d88939eee42c7fe8b46f8517cc3c85f834bc9c5b443e99400d

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: bc3c946e13f3b97a560798e1aee414a2802f3dc399a3f17509140f60796ee694

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: d54160832eee842097daee819c850df8634df3f19b666b4b8e9177d7e1332bb4

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 3bc8eb3d28afb89fbcb4c246bc1b25ca2b704f5ac9c32d23a612c4e30fd29755

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dfb58508f07196c9d68b14c841ea3dd0b66cb567c8d1b2a36c7ae93c4fb0c1bd

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 3213ebed37a842d461a066f7de6dd22ee97099b0e132437e15558e3badf5e5c4

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dd62cd9b516f90c03379d35050218885a44efae07dd6d1ab3c0b8606539dcb7e

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: ce3679712529b4d09dff6fbd6b282f8d0c6a34472e09cc05406148ac33afd2a3

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 80f5afbd27fc0064474f11f7e332872d1d5713d362d7c63dcb41c284713da00b

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: eeaca9b6b2fd1cd6bf34937fb34416dcd95c68a9b13964597ca483adfa996e51

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: dcd7fc996219d181e0f72a2852389248b9ed436fbd14841fb58c8f2c2ebab2c8

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.ppc64le.rpm

SHA-256: 0c74b3e6911b31946cd1ac78cbe3352172d8d67920d3cea45c9c9c3b625b745d

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.src.rpm

SHA-256: 8cb2113e33aaf7e2694f12f1c1f25f16a211bbc62e4c3294c6aa40cbad55b521

galera-26.4.11-1.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 4722c493ee29a10e83aa91e64d75fb636856adb5797e1ba07bc7283a81d008e5

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.src.rpm

SHA-256: 553f5e245e822220d83b683668cb4f9580e169f9f7b3c0336e77c300d7b9d7b5

x86_64

Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: 7fb70d2a30cddc57c57c62c1ccc697193817430f0012136a6d265aeabe2a7fc2

Judy-debuginfo-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b94c919cd2d750b91e615660bf6c48ebe4d0c97d270d6fa8a5ce3fe708cf0db5

Judy-debugsource-1.0.5-18.module+el8.4.0+9031+9abc7af9.x86_64.rpm

SHA-256: b611108a8273edc2b620ca172984f9cb69da81452eed55e5b2d7667fc54363f2

galera-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 434908e502acc5e61b50baae7999450f3b267f5e24a0199d20b24912cd40ce26

galera-debuginfo-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2c1905f4c00a5983af21198eda6027176acbc9a26dd7fd56415974c9b323e8d0

galera-debugsource-26.4.11-1.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 42744bd3887500230bd53a5c71d61c9f3e5a5110b207b172e3ca2f48003aa66c

mariadb-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 6b4505965d454c7671d63d312ed9c974f24523b1770aacc798aa62e19d6e6f7e

mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 21a1aed3ba05eb0207db1e0e64a2817e516e049d26a1d3a47feb296fe6bb0454

mariadb-backup-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: bedb282725e411e16847ee4fc9124289b9e8f1a609b9f0592d33dc850ad752b3

mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: d8d2df406680a4ead7b116ade4b5148df9e27a740c70c295ce0e0644821b0dcf

mariadb-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: aa6c5755f4715328195d004489dac0de45d91ab7680a6dbc14e380b7b923b2f7

mariadb-debugsource-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 8deb531556d298a0d8b8cbbebb59bb7a0ed555aaebdc40ce3b4375593f0f8eaa

mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c6c58c39292e9a2a695e1bbb1559977d4cf8235a1b10c052a2a5a9ba091b9ac3

mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 0d7a2cf6453ab248400ee2f1cdd8b45dc4b4ccbf5dbacf5d5e287c1ca6e9e7c0

mariadb-embedded-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9a4487dcd74f47f22e343a79b8cff25dc2b39d20e532d83777cc4f42776b49e4

mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 339f79f8d032ec3c5c1f17285acd116e4b9be9d7c1eb0beb5dd338d9a33ce537

mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 550f3fe92062d82d00932c8af820e633141496341926e7a816240d9f3704d213

mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 2f8b7380b4bfd39cb580b4a38f1e503f7cb417b7788dee47446fa007517bbc85

mariadb-gssapi-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a7341aa7c15e90adc0df71ba51d58962bd658f31b3be1a86a2dd4d230e9e8533

mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: c8cd283177a9f51540c41d2f80c8fa49780b0138f2cc5058c4e190f9358e38a1

mariadb-oqgraph-engine-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f2b414d83d8493cddda8ec905f1315dd0c47f80c079e0b156a9f7313dec61a3

mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 563e5bfb37504da8efadc4a74ec43a9b3e4537821abaa565c699bb3b7048f051

mariadb-pam-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: fe2924188de0da9243c561da2ef77259c9f164eb79788a3670cc28d22704fa9a

mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 08bb15263b716c089ca2462f9443de228b9f1412fa6f4db02e7bbf4b2e51e54d

mariadb-server-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7d233c9c42e6577a31ec460edc52238f9d4f94912ceff62dc2b61c9ef78007f4

mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 9b73242aac3e82f74df376626178ce94f9146524f2a2542434c3f027f59101b7

mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: e2d1640d8fa34d58c7c580d098395dd084399f53fee4171dfe1ff6e2cc169fa9

mariadb-server-utils-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: dc01698e6e6c280d32be17b57b9ea3d8b4637180ae7f010b701ee9412bfe5ef0

mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: a9e26e810877ba3da4675c12a5f08fcff96a9ef3893a83254f81f6b675a338b2

mariadb-test-debuginfo-10.5.16-2.module+el8.6.0+15639+405b7427.x86_64.rpm

SHA-256: 7f905c8d8dd616e64a0e3f12835c5a77a9d1eddfb995f47720d0ff1413c24c13

Related news

Gentoo Linux Security Advisory 202405-25

Gentoo Linux Security Advisory 202405-25 - Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code. Versions greater than or equal to 10.11.3:10.11 are affected.

CVE-2023-28069: DSA-2022-258: Dell Streaming Data Platform Security Update for Multiple Third-Party Component Vulnerabilities

Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.

Ubuntu Security Notice USN-5739-1

Ubuntu Security Notice 5739-1 - Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.37 in Ubuntu 20.04 LTS and to 10.6.11 in Ubuntu 22.04 LTS and Ubuntu 22.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

RHSA-2022:6443: Red Hat Security Advisory: mariadb:10.3 security and bug fix update

An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

RHSA-2022:6306: Red Hat Security Advisory: rh-mariadb103-galera and rh-mariadb103-mariadb security and bug fix update

An update for rh-mariadb103-galera and rh-mariadb103-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

CVE-2022-31623: MDEV-26561 Fix a bug due to unreleased lock by ryancaicse · Pull Request #1938 · MariaDB/server

MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock.

CVE-2022-31622: [MDEV-26561] An improper locking bug due to the unreleased lock

MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.

CVE-2022-27457: [MDEV-28098] incorrect key in "dup value" error after long unique

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.

CVE-2022-27452: [MDEV-28090] MariaDB SEGV issue - Jira

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.

CVE-2022-27445: [MDEV-28081] MariaDB SEGV issue - Jira

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.

CVE-2022-27451: [MDEV-28094] Window function in expression in ORDER BY

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.

CVE-2022-27446: [MDEV-28082] Crash when using HAVING with IS NULL predicate in an equality

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.

CVE-2022-27449: [MDEV-28089] MariaDB SEGV issue - Jira

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.

CVE-2022-27444: [MDEV-28080] Crash when using HAVING with NOT EXIST predicate in an equality

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.

CVE-2022-27458: [MDEV-28099] MariaDB UAP issue - Jira

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h.

CVE-2022-27448: [MDEV-28095] crash in multi-update and implicit grouping

There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.

CVE-2022-27456: [MDEV-28093] MariaDB UAP issue - Jira

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.

CVE-2022-27455: [MDEV-28097] use-after-free when WHERE has subquery with an outer reference in HAVING

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.

CVE-2022-27386: [MDEV-26406] A SEGV in sql/sql_class.cc

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.

CVE-2022-27380: [MDEV-26280] MariaDB server crash at my_decimal::operator=

An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27378: [MDEV-26423] MariaDB server crash in Create_tmp_table::finalize

An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27384: [MDEV-26047] MariaDB server crash at Item_subselect::init_expr_cache_tracker

An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27386: [MDEV-26406] A SEGV in sql/sql_class.cc

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.

CVE-2022-27381: [MDEV-26061] MariaDB server crash at Field::set_default

An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27382: [MDEV-26402] A SEGV in Item_field::used_tables/update_depend_map_for_order or Assertion `fixed == 1'

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.

CVE-2022-27377: [MDEV-26281] ASAN use-after-poison when complex conversion is involved in blob

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.

CVE-2022-27383: [MDEV-26323] use-after-poison issue of MariaDB server

MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.

CVE-2022-27376: [MDEV-26354] MariaDB server crash in Field::set_default - ASAN use after free in Item_args::walk_arg

MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.

CVE-2022-27379: [MDEV-26353] MariaDB server crash in Arg_comparator::compare_real_fixed

An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27387: [MDEV-26422] ASAN: global-buffer-overflow in decimal_bin_size on SELECT

MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24048: ZDI-22-363

MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24050: ZDI-22-364

MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2021-46668: [MDEV-25787] Bug report: crash on SELECT DISTINCT thousands_blob_fields

MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.

CVE-2021-46664: [MDEV-25761] Assertion `aggr != __null' failed in sub_select_postjoin_aggr

MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.

CVE-2021-46663: [MDEV-26351] segfault - (MARIA_HA *) 0x0 in ha_maria::extra

MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.

CVE-2021-46661: [MDEV-25766] Unused CTE lead to a crash in find_field_in_tables/find_order_in_list

MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).

CVE-2021-46669: [MDEV-25638] Assertion `!result' failed in convert_const_to_int

MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.

CVE-2021-46665: [MDEV-25636] Bug report: abortion in sql/sql_parse.cc:6294

MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.

CVE-2021-46659: [MDEV-25631] Crash executing query with VIEW, aggregate and subquery

MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.