Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:6443: Red Hat Security Advisory: mariadb:10.3 security and bug fix update

An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery
  • CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE)
  • CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements
  • CVE-2021-46664: mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr
  • CVE-2021-46665: mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations
  • CVE-2021-46668: mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements
  • CVE-2021-46669: mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used
  • CVE-2022-21427: mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)
  • CVE-2022-24048: mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer
  • CVE-2022-24050: mariadb: lack of validating the existence of an object prior to performing operations on the object
  • CVE-2022-24051: mariadb: lack of proper validation of a user-supplied string before using it as a format specifier
  • CVE-2022-24052: mariadb: CONNECT storage engine heap-based buffer overflow
  • CVE-2022-27376: mariadb: assertion failure in Item_args::walk_arg
  • CVE-2022-27377: mariadb: use-after-poison when complex conversion is involved in blob
  • CVE-2022-27378: mariadb: server crash in create_tmp_table::finalize
  • CVE-2022-27379: mariadb: server crash in component arg_comparator::compare_real_fixed
  • CVE-2022-27380: mariadb: server crash at my_decimal::operator=
  • CVE-2022-27381: mariadb: server crash at Field::set_default via specially crafted SQL statements
  • CVE-2022-27383: mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c
  • CVE-2022-27384: mariadb: crash via component Item_subselect::init_expr_cache_tracker
  • CVE-2022-27386: mariadb: server crashes in query_arena::set_query_arena upon SELECT from view
  • CVE-2022-27387: mariadb: assertion failures in decimal_bin_size
  • CVE-2022-27445: mariadb: assertion failure in compare_order_elements
  • CVE-2022-27447: mariadb: use-after-poison in Binary_string::free_buffer
  • CVE-2022-27448: mariadb: crash in multi-update and implicit grouping
  • CVE-2022-27449: mariadb: assertion failure in sql/item_func.cc
  • CVE-2022-27452: mariadb: assertion failure in sql/item_cmpfunc.cc
  • CVE-2022-27456: mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc
  • CVE-2022-27458: mariadb: use-after-poison in Binary_string::free_buffer
  • CVE-2022-31622: mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc
  • CVE-2022-31623: mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc
  • CVE-2022-32083: mariadb: server crash at Item_subselect::init_expr_cache_tracker
  • CVE-2022-32085: mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor
  • CVE-2022-32087: mariadb: server crash in Item_args::walk_args
  • CVE-2022-32088: mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort
Red Hat Security Data
#sql#vulnerability#linux#red_hat#buffer_overflow#ibm#sap

Synopsis

Moderate: mariadb:10.3 security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the mariadb:10.3 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35).

Security Fix(es):

  • mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
  • mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
  • mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
  • mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
  • mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
  • mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052)
  • mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
  • mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
  • mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
  • mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
  • mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
  • mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
  • mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
  • mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
  • mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
  • mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
  • mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
  • mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
  • mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
  • mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
  • mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
  • mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
  • mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
  • mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
  • mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
  • mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083)
  • mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085)
  • mariadb: server crash in Item_args::walk_args (CVE-2022-32087)
  • mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088)
  • mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
  • mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
  • mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
  • mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
  • mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
  • mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2049302 - CVE-2021-46659 mariadb: Crash executing query with VIEW, aggregate and subquery
  • BZ - 2050017 - CVE-2021-46661 mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE)
  • BZ - 2050022 - CVE-2021-46663 mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements
  • BZ - 2050024 - CVE-2021-46664 mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr
  • BZ - 2050026 - CVE-2021-46665 mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations
  • BZ - 2050032 - CVE-2021-46668 mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements
  • BZ - 2050034 - CVE-2021-46669 mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used
  • BZ - 2068211 - CVE-2022-24052 mariadb: CONNECT storage engine heap-based buffer overflow
  • BZ - 2068233 - CVE-2022-24051 mariadb: lack of proper validation of a user-supplied string before using it as a format specifier
  • BZ - 2068234 - CVE-2022-24048 mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer
  • BZ - 2069833 - CVE-2022-24050 mariadb: lack of validating the existence of an object prior to performing operations on the object
  • BZ - 2074817 - CVE-2022-27376 mariadb: assertion failure in Item_args::walk_arg
  • BZ - 2074947 - CVE-2022-27377 mariadb: use-after-poison when complex conversion is involved in blob
  • BZ - 2074949 - CVE-2022-27378 mariadb: server crash in create_tmp_table::finalize
  • BZ - 2074951 - CVE-2022-27379 mariadb: server crash in component arg_comparator::compare_real_fixed
  • BZ - 2074966 - CVE-2022-27380 mariadb: server crash at my_decimal::operator=
  • BZ - 2074981 - CVE-2022-27381 mariadb: server crash at Field::set_default via specially crafted SQL statements
  • BZ - 2074996 - CVE-2022-27383 mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c
  • BZ - 2074999 - CVE-2022-27384 mariadb: crash via component Item_subselect::init_expr_cache_tracker
  • BZ - 2075005 - CVE-2022-27386 mariadb: server crashes in query_arena::set_query_arena upon SELECT from view
  • BZ - 2075006 - CVE-2022-27387 mariadb: assertion failures in decimal_bin_size
  • BZ - 2075691 - CVE-2022-27445 mariadb: assertion failure in compare_order_elements
  • BZ - 2075693 - CVE-2022-27447 mariadb: use-after-poison in Binary_string::free_buffer
  • BZ - 2075694 - CVE-2022-27448 mariadb: crash in multi-update and implicit grouping
  • BZ - 2075695 - CVE-2022-27449 mariadb: assertion failure in sql/item_func.cc
  • BZ - 2075697 - CVE-2022-27456 mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc
  • BZ - 2075700 - CVE-2022-27458 mariadb: use-after-poison in Binary_string::free_buffer
  • BZ - 2076145 - CVE-2022-27452 mariadb: assertion failure in sql/item_cmpfunc.cc
  • BZ - 2082644 - CVE-2022-21427 mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)
  • BZ - 2092354 - CVE-2022-31622 mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc
  • BZ - 2092360 - CVE-2022-31623 mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc
  • BZ - 2104425 - CVE-2022-32083 mariadb: server crash at Item_subselect::init_expr_cache_tracker
  • BZ - 2104431 - CVE-2022-32085 mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor
  • BZ - 2104434 - CVE-2022-32087 mariadb: server crash in Item_args::walk_args
  • BZ - 2106008 - CVE-2022-32088 mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort

CVEs

  • CVE-2021-46659
  • CVE-2021-46661
  • CVE-2021-46663
  • CVE-2021-46664
  • CVE-2021-46665
  • CVE-2021-46668
  • CVE-2021-46669
  • CVE-2022-21427
  • CVE-2022-24048
  • CVE-2022-24050
  • CVE-2022-24051
  • CVE-2022-24052
  • CVE-2022-27376
  • CVE-2022-27377
  • CVE-2022-27378
  • CVE-2022-27379
  • CVE-2022-27380
  • CVE-2022-27381
  • CVE-2022-27383
  • CVE-2022-27384
  • CVE-2022-27386
  • CVE-2022-27387
  • CVE-2022-27445
  • CVE-2022-27447
  • CVE-2022-27448
  • CVE-2022-27449
  • CVE-2022-27452
  • CVE-2022-27456
  • CVE-2022-27458
  • CVE-2022-31622
  • CVE-2022-31623
  • CVE-2022-32083
  • CVE-2022-32085
  • CVE-2022-32087
  • CVE-2022-32088

Red Hat Enterprise Linux for x86_64 8

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

x86_64

Judy-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 88a29f33354754a242d50476ca18bb99d2af3884742e4f31c276ebee7c69338a

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: f2ca433f1ce80240b1a4c7a66d967d877504b9d31264c774013f857ed2a05623

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 6d430b0e9a8de476437df76c6c876444cc0635c1d3ca27a157c7c13e16668f70

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f6b9a5008016ff806167f3909eb69a4678a9a9bed56dc34162bbd240e6570985

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 163d0bf0c1517b2fa4b28d612fd4761260e5b63cfa62ce1a47167947325ac560

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: fffb001f6814d10d89c7c511f6456638442a350896545fd6871f9206ce06575c

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 287a5677f635b370a120bf9bf40d0f23d452d722989cc7ba4ef8c0b460b327de

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b773a8042ba8f1b781b36284db4cd0c9737fb59412474fde3c66dbbe3af389b2

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 522fc7b60c7f8ba6a2ad894704cbe2ce6c19b5cba92023cc75d1b443bca807e0

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 29acdfda9b432179a542e32e97f1d2c9c1047cce185ff1fa29af9349c6615ee5

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 9cf1598a4491aa8a68014520ee4697b756d2317759b6d9dcfaa32d786187a403

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 3d9cddd5aacfc30440f25237a8cc00b69f176f808a6bdb7d4396344f3e9ba7ae

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 4165dcb02843792359fcff6ed153517f8555a83d2d652550ebb0cabddf519e5b

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 58cd50d692e93e480e021eb56d123221877d752aeb3722db02253c8faee12042

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f3bb3138b3d58c71ddb5797d7a1e351b340a154becf520b12f5defd9ed12fba3

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 2dcf09804c242260e93aabc7cf8548c94adf54788cfc970db0a99eae30411a29

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d8a93f38eddd8df6113e032f7b8be0fd17a843091e30b7135d7c34202bad3522

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b1e2bce447caf34c0ec87fbd1d2cdc5a32e3413db3aeeccf29f28b9cc62b1677

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 419caa69c456cb63c7fab291c99a51318aae453a97d6f7de5867aec36ea2b515

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ed00cae7134aab4f0d559c059ebcdbe717e674f0984b59936845019f4c0cc824

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ce38c714f8f0265786a07282c7be36da54859c7e01ddd3d3f2bfef447eb564c6

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f7e796ac048b95d4ffba9ccecf677659293ac695390cc94f7c4925d26c7f715c

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 71b4334c92e3f876ddce5a93f3bb5a5396b11ab85b2ef446f6ecb9f20e3f09a6

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d90f95410288f28267fce3bad919fb0c666396f41dfdc9b4c1c6c806b57664e3

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 91968485a3e18ec30a20661fce0c7740c4a76cc52ba9cf3d3a2a3e574afe8134

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 5fdbb9e454702b61c769fac09ca69f2f43114495cff98b7a6621a8d8fe1cf55c

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 1978686da547e350049c481865bbb05edf67b0817c6cbcb4f4a6e97ba3bd7b4c

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: af648b3a700163dd6c07856505605711b168d2ecbe99ac897d6398785bc8f007

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

x86_64

Judy-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 88a29f33354754a242d50476ca18bb99d2af3884742e4f31c276ebee7c69338a

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: f2ca433f1ce80240b1a4c7a66d967d877504b9d31264c774013f857ed2a05623

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 6d430b0e9a8de476437df76c6c876444cc0635c1d3ca27a157c7c13e16668f70

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f6b9a5008016ff806167f3909eb69a4678a9a9bed56dc34162bbd240e6570985

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 163d0bf0c1517b2fa4b28d612fd4761260e5b63cfa62ce1a47167947325ac560

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: fffb001f6814d10d89c7c511f6456638442a350896545fd6871f9206ce06575c

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 287a5677f635b370a120bf9bf40d0f23d452d722989cc7ba4ef8c0b460b327de

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b773a8042ba8f1b781b36284db4cd0c9737fb59412474fde3c66dbbe3af389b2

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 522fc7b60c7f8ba6a2ad894704cbe2ce6c19b5cba92023cc75d1b443bca807e0

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 29acdfda9b432179a542e32e97f1d2c9c1047cce185ff1fa29af9349c6615ee5

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 9cf1598a4491aa8a68014520ee4697b756d2317759b6d9dcfaa32d786187a403

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 3d9cddd5aacfc30440f25237a8cc00b69f176f808a6bdb7d4396344f3e9ba7ae

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 4165dcb02843792359fcff6ed153517f8555a83d2d652550ebb0cabddf519e5b

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 58cd50d692e93e480e021eb56d123221877d752aeb3722db02253c8faee12042

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f3bb3138b3d58c71ddb5797d7a1e351b340a154becf520b12f5defd9ed12fba3

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 2dcf09804c242260e93aabc7cf8548c94adf54788cfc970db0a99eae30411a29

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d8a93f38eddd8df6113e032f7b8be0fd17a843091e30b7135d7c34202bad3522

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b1e2bce447caf34c0ec87fbd1d2cdc5a32e3413db3aeeccf29f28b9cc62b1677

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 419caa69c456cb63c7fab291c99a51318aae453a97d6f7de5867aec36ea2b515

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ed00cae7134aab4f0d559c059ebcdbe717e674f0984b59936845019f4c0cc824

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ce38c714f8f0265786a07282c7be36da54859c7e01ddd3d3f2bfef447eb564c6

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f7e796ac048b95d4ffba9ccecf677659293ac695390cc94f7c4925d26c7f715c

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 71b4334c92e3f876ddce5a93f3bb5a5396b11ab85b2ef446f6ecb9f20e3f09a6

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d90f95410288f28267fce3bad919fb0c666396f41dfdc9b4c1c6c806b57664e3

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 91968485a3e18ec30a20661fce0c7740c4a76cc52ba9cf3d3a2a3e574afe8134

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 5fdbb9e454702b61c769fac09ca69f2f43114495cff98b7a6621a8d8fe1cf55c

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 1978686da547e350049c481865bbb05edf67b0817c6cbcb4f4a6e97ba3bd7b4c

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: af648b3a700163dd6c07856505605711b168d2ecbe99ac897d6398785bc8f007

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

x86_64

Judy-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 88a29f33354754a242d50476ca18bb99d2af3884742e4f31c276ebee7c69338a

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: f2ca433f1ce80240b1a4c7a66d967d877504b9d31264c774013f857ed2a05623

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 6d430b0e9a8de476437df76c6c876444cc0635c1d3ca27a157c7c13e16668f70

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f6b9a5008016ff806167f3909eb69a4678a9a9bed56dc34162bbd240e6570985

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 163d0bf0c1517b2fa4b28d612fd4761260e5b63cfa62ce1a47167947325ac560

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: fffb001f6814d10d89c7c511f6456638442a350896545fd6871f9206ce06575c

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 287a5677f635b370a120bf9bf40d0f23d452d722989cc7ba4ef8c0b460b327de

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b773a8042ba8f1b781b36284db4cd0c9737fb59412474fde3c66dbbe3af389b2

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 522fc7b60c7f8ba6a2ad894704cbe2ce6c19b5cba92023cc75d1b443bca807e0

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 29acdfda9b432179a542e32e97f1d2c9c1047cce185ff1fa29af9349c6615ee5

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 9cf1598a4491aa8a68014520ee4697b756d2317759b6d9dcfaa32d786187a403

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 3d9cddd5aacfc30440f25237a8cc00b69f176f808a6bdb7d4396344f3e9ba7ae

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 4165dcb02843792359fcff6ed153517f8555a83d2d652550ebb0cabddf519e5b

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 58cd50d692e93e480e021eb56d123221877d752aeb3722db02253c8faee12042

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f3bb3138b3d58c71ddb5797d7a1e351b340a154becf520b12f5defd9ed12fba3

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 2dcf09804c242260e93aabc7cf8548c94adf54788cfc970db0a99eae30411a29

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d8a93f38eddd8df6113e032f7b8be0fd17a843091e30b7135d7c34202bad3522

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b1e2bce447caf34c0ec87fbd1d2cdc5a32e3413db3aeeccf29f28b9cc62b1677

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 419caa69c456cb63c7fab291c99a51318aae453a97d6f7de5867aec36ea2b515

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ed00cae7134aab4f0d559c059ebcdbe717e674f0984b59936845019f4c0cc824

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ce38c714f8f0265786a07282c7be36da54859c7e01ddd3d3f2bfef447eb564c6

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f7e796ac048b95d4ffba9ccecf677659293ac695390cc94f7c4925d26c7f715c

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 71b4334c92e3f876ddce5a93f3bb5a5396b11ab85b2ef446f6ecb9f20e3f09a6

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d90f95410288f28267fce3bad919fb0c666396f41dfdc9b4c1c6c806b57664e3

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 91968485a3e18ec30a20661fce0c7740c4a76cc52ba9cf3d3a2a3e574afe8134

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 5fdbb9e454702b61c769fac09ca69f2f43114495cff98b7a6621a8d8fe1cf55c

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 1978686da547e350049c481865bbb05edf67b0817c6cbcb4f4a6e97ba3bd7b4c

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: af648b3a700163dd6c07856505605711b168d2ecbe99ac897d6398785bc8f007

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

s390x

Judy-1.0.5-18.module+el8+2765+cfa4f87b.s390x.rpm

SHA-256: 6550fe66f47ba0b586fca537c2a74b27ff5a6de4f0835aebf4a6c18d4ff88023

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.s390x.rpm

SHA-256: 114f89f67f07969dd85c9d9de4e0a7018de58839e3b4cc1f6c48d702e11afac2

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.s390x.rpm

SHA-256: 888333a49aee65e6d65a18eda4f13421f528698b1d8430e568fa36597f2b4bb9

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: b51c27fcc44e6aa85c7ca40544bf6e85f476ec1c482bfa61be9274cce9f196cb

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 494885c7862774444d95da0d16586fceca6377e5965c9c1a0d756f6d52738316

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: e519213a4e25be27f8f84a9ae63bb96d6fb2015e14fb21d7abe07ed493d381ec

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: bfc241301a9cc94a30eb2a2ab70e6bd1c758261b69ab044f58265a89aea9aa62

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 302906e868ce5517ef4e24f0cb72de4d6561af4dae4a5a9f56b56a3ff36f9ec1

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 9213c47635b5e569095302f63eed168005f205a8345992278e78d170753b0c6c

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 0a223ec522312f3e27646178f5a716f6f75f1aaf4dbf4ade56835cd18f1818b2

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: c7b30ce18c45bef56666cf009e2e8dee979edbaa453d8765d59e3e7b3a104a30

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: d3f179a15c30a267e0f4bfec74563986bff23ecae78d46247340bfaa63377e2d

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: cb9aca3f6312b84a0c317235df911b104dc737cd7fc7f063881c1d3ef3a83bf4

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 55340f8fb013a3df3a133ef3c296419653655efcb5fd5e3a090e6e0ae45882ba

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 501b9ce4f9b7d48e8f202efa495e7e01b79c1d9e7b85ecb97172c25b792d2f8b

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 167ac1f7e5b07fe3aaa5b99f13acdb7a52a0f6e6e5e599ec8e809143ea0fe011

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 21aefadde7686a70772c1c3f811c3a378740e3255173df8f119b403baf16c145

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 4eb45d27d04ff182b0fd3754119fd92c730d3e93d203d4eec7b7f2a920f65ba4

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: e7daa6f6b68a82931b1fe9ed097f377c4dbb086dbd61919035b8c7f688763f94

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 0a842274c94afa1ec8f7cfda96e3f0a18bb8f7c20171bbe058210c00e0f2a389

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 3ad000d28e432738cf0d049f00949f54c77759777089fb5d2b2d566b4f474995

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: e25d1594cc197af1d469c9454901ac1935e6a8c7f985c1bf068c1bee843c6364

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: b775e3e42ff87d42e80a6f38573f12898ad9aecf62b7d5910e78b9c6b44684f6

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: c9376933f7eb5f4c63d02a86c138c449469efad1cb7e5aff930b7db9c8e8277a

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 0d458ce13025eb2a4ef59288842eabbc961e93ec232302a024b68af6f719f55e

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 6c4e74d47c836164f286034bf97765dbf7c6f4020c49c438ca334369da101f77

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 5e89497db0f690f3cc994bc5ae3f85e3771db18e300ed922a94e1c3b56941be4

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 908061e0498617508e700b5a15d51f22428337127731b3321aa604668980b37c

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

s390x

Judy-1.0.5-18.module+el8+2765+cfa4f87b.s390x.rpm

SHA-256: 6550fe66f47ba0b586fca537c2a74b27ff5a6de4f0835aebf4a6c18d4ff88023

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.s390x.rpm

SHA-256: 114f89f67f07969dd85c9d9de4e0a7018de58839e3b4cc1f6c48d702e11afac2

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.s390x.rpm

SHA-256: 888333a49aee65e6d65a18eda4f13421f528698b1d8430e568fa36597f2b4bb9

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: b51c27fcc44e6aa85c7ca40544bf6e85f476ec1c482bfa61be9274cce9f196cb

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 494885c7862774444d95da0d16586fceca6377e5965c9c1a0d756f6d52738316

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: e519213a4e25be27f8f84a9ae63bb96d6fb2015e14fb21d7abe07ed493d381ec

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: bfc241301a9cc94a30eb2a2ab70e6bd1c758261b69ab044f58265a89aea9aa62

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 302906e868ce5517ef4e24f0cb72de4d6561af4dae4a5a9f56b56a3ff36f9ec1

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 9213c47635b5e569095302f63eed168005f205a8345992278e78d170753b0c6c

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 0a223ec522312f3e27646178f5a716f6f75f1aaf4dbf4ade56835cd18f1818b2

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: c7b30ce18c45bef56666cf009e2e8dee979edbaa453d8765d59e3e7b3a104a30

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: d3f179a15c30a267e0f4bfec74563986bff23ecae78d46247340bfaa63377e2d

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: cb9aca3f6312b84a0c317235df911b104dc737cd7fc7f063881c1d3ef3a83bf4

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 55340f8fb013a3df3a133ef3c296419653655efcb5fd5e3a090e6e0ae45882ba

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 501b9ce4f9b7d48e8f202efa495e7e01b79c1d9e7b85ecb97172c25b792d2f8b

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 167ac1f7e5b07fe3aaa5b99f13acdb7a52a0f6e6e5e599ec8e809143ea0fe011

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 21aefadde7686a70772c1c3f811c3a378740e3255173df8f119b403baf16c145

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 4eb45d27d04ff182b0fd3754119fd92c730d3e93d203d4eec7b7f2a920f65ba4

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: e7daa6f6b68a82931b1fe9ed097f377c4dbb086dbd61919035b8c7f688763f94

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 0a842274c94afa1ec8f7cfda96e3f0a18bb8f7c20171bbe058210c00e0f2a389

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 3ad000d28e432738cf0d049f00949f54c77759777089fb5d2b2d566b4f474995

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: e25d1594cc197af1d469c9454901ac1935e6a8c7f985c1bf068c1bee843c6364

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: b775e3e42ff87d42e80a6f38573f12898ad9aecf62b7d5910e78b9c6b44684f6

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: c9376933f7eb5f4c63d02a86c138c449469efad1cb7e5aff930b7db9c8e8277a

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 0d458ce13025eb2a4ef59288842eabbc961e93ec232302a024b68af6f719f55e

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 6c4e74d47c836164f286034bf97765dbf7c6f4020c49c438ca334369da101f77

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 5e89497db0f690f3cc994bc5ae3f85e3771db18e300ed922a94e1c3b56941be4

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.s390x.rpm

SHA-256: 908061e0498617508e700b5a15d51f22428337127731b3321aa604668980b37c

Red Hat Enterprise Linux for Power, little endian 8

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

ppc64le

Judy-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: e784fa218dfe9e225caff5a29d988b7e5a0817dc2a67c59412f954482f8cacdf

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: 7d703e673d669a38b5242f6fe8e799f6aa07d0313f4dd6fd26d56fa849f2cc90

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: 5ff324427bd56c8f408cadfd25f697d8e004f1222ba10f38fc81f9df40a1f9d2

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: c31e0b9d9d2418a94f3d5eb3a7efc024b4d486182c6f42dde981774c78e692e7

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 7c10b075a2ec0beb6f17518373143c245292af1738c21288d088aecf2c6c1752

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: b3724ace11bd965d83780ba3649a194da4dcf0056bb1633eadbd17ca88fa5a18

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 1b83e93cd963cfdcf6646595679e77d9fa079e0184926c55f845b3d72dbdb90c

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 2b52a98ff7b10e2ae0e9da11146a9500ca7f73f998d3b2f11e6630b405a9cf49

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 3bc8f23dadd595606b07f9ba20a2a04f3e2cd2ac7afd53f43a49144de48161e7

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 6a2893e18683bb007782e0746be17560241120857e665e290bbc0f148283ffa5

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 2a38358031788da5f85e74cc669faec369f2c0765afe41e5df80dd139049b17f

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: bc2cec0cabbd05da40d7e80b094ee5ff767bda35be1f97d3a85ad2f232251340

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: bee0f76fcf4dc3fbea35b78bced26a78784d82b9bd6465b6510d6e008fe20507

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 794185d1b68357dd81fb524b784e36a33150544680353f4150899b89de640db5

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 236950a07aae6ab0adeaaec2f5affe446243d344948c7a4c0d60a1c23304fe2d

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 6582386c0b495daebce4cb6a706b3b5facfd171eb8f42ceb1d603e27d95149bf

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: de886e71b7f174090079f0f5e7322c15253b05db88dca765d5c4623cc5d54e6c

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 3307862b3786a8543595af7a304e69631aad2e88204187239c088e8ee87f679a

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: cbb786a8e964bd5c3b3801464897fb31fc72016442b3995949c2cecd609e7541

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 54d957cf237e2d066c30aa889df3754ea4174b562407133f665b9e864673bf90

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 70127cfc5fbe8cc1ccaf40329280bc340da5bdda73e33b27c6891cb48ddf6d4a

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: eaa8325bfe798bffe5dbaff1e58ae4323b312be05ae09c7c7b4495ffc3963ad6

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 58f32ac55ffdc824d009bbc3d1d695089c5ccda5dfdd7880fbb8023adfd38411

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: af2ead5fea1fb127dee36575705b9953543f689fb52f814aa82725bdb1bba72c

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: eb3fb1af17f0682c1536b730fc55eb6b9f0d1e44bbc2cbbed1122257cc4c767d

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: f89d222934c0b29e5063a3f8bcce31a0c93690c122c8a818a1683fd3db85f50d

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: b4ef2d3be13d64b1d3b21d458a2d70d8cb9fa7bf318f87f94a17ea5536725f57

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 75c3ba5cce5e0dcc9c031b51d574b5f867c3389b71a2a28f3099dc3382aeba14

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

ppc64le

Judy-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: e784fa218dfe9e225caff5a29d988b7e5a0817dc2a67c59412f954482f8cacdf

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: 7d703e673d669a38b5242f6fe8e799f6aa07d0313f4dd6fd26d56fa849f2cc90

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: 5ff324427bd56c8f408cadfd25f697d8e004f1222ba10f38fc81f9df40a1f9d2

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: c31e0b9d9d2418a94f3d5eb3a7efc024b4d486182c6f42dde981774c78e692e7

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 7c10b075a2ec0beb6f17518373143c245292af1738c21288d088aecf2c6c1752

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: b3724ace11bd965d83780ba3649a194da4dcf0056bb1633eadbd17ca88fa5a18

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 1b83e93cd963cfdcf6646595679e77d9fa079e0184926c55f845b3d72dbdb90c

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 2b52a98ff7b10e2ae0e9da11146a9500ca7f73f998d3b2f11e6630b405a9cf49

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 3bc8f23dadd595606b07f9ba20a2a04f3e2cd2ac7afd53f43a49144de48161e7

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 6a2893e18683bb007782e0746be17560241120857e665e290bbc0f148283ffa5

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 2a38358031788da5f85e74cc669faec369f2c0765afe41e5df80dd139049b17f

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: bc2cec0cabbd05da40d7e80b094ee5ff767bda35be1f97d3a85ad2f232251340

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: bee0f76fcf4dc3fbea35b78bced26a78784d82b9bd6465b6510d6e008fe20507

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 794185d1b68357dd81fb524b784e36a33150544680353f4150899b89de640db5

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 236950a07aae6ab0adeaaec2f5affe446243d344948c7a4c0d60a1c23304fe2d

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 6582386c0b495daebce4cb6a706b3b5facfd171eb8f42ceb1d603e27d95149bf

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: de886e71b7f174090079f0f5e7322c15253b05db88dca765d5c4623cc5d54e6c

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 3307862b3786a8543595af7a304e69631aad2e88204187239c088e8ee87f679a

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: cbb786a8e964bd5c3b3801464897fb31fc72016442b3995949c2cecd609e7541

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 54d957cf237e2d066c30aa889df3754ea4174b562407133f665b9e864673bf90

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 70127cfc5fbe8cc1ccaf40329280bc340da5bdda73e33b27c6891cb48ddf6d4a

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: eaa8325bfe798bffe5dbaff1e58ae4323b312be05ae09c7c7b4495ffc3963ad6

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 58f32ac55ffdc824d009bbc3d1d695089c5ccda5dfdd7880fbb8023adfd38411

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: af2ead5fea1fb127dee36575705b9953543f689fb52f814aa82725bdb1bba72c

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: eb3fb1af17f0682c1536b730fc55eb6b9f0d1e44bbc2cbbed1122257cc4c767d

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: f89d222934c0b29e5063a3f8bcce31a0c93690c122c8a818a1683fd3db85f50d

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: b4ef2d3be13d64b1d3b21d458a2d70d8cb9fa7bf318f87f94a17ea5536725f57

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 75c3ba5cce5e0dcc9c031b51d574b5f867c3389b71a2a28f3099dc3382aeba14

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

x86_64

Judy-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 88a29f33354754a242d50476ca18bb99d2af3884742e4f31c276ebee7c69338a

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: f2ca433f1ce80240b1a4c7a66d967d877504b9d31264c774013f857ed2a05623

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 6d430b0e9a8de476437df76c6c876444cc0635c1d3ca27a157c7c13e16668f70

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f6b9a5008016ff806167f3909eb69a4678a9a9bed56dc34162bbd240e6570985

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 163d0bf0c1517b2fa4b28d612fd4761260e5b63cfa62ce1a47167947325ac560

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: fffb001f6814d10d89c7c511f6456638442a350896545fd6871f9206ce06575c

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 287a5677f635b370a120bf9bf40d0f23d452d722989cc7ba4ef8c0b460b327de

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b773a8042ba8f1b781b36284db4cd0c9737fb59412474fde3c66dbbe3af389b2

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 522fc7b60c7f8ba6a2ad894704cbe2ce6c19b5cba92023cc75d1b443bca807e0

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 29acdfda9b432179a542e32e97f1d2c9c1047cce185ff1fa29af9349c6615ee5

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 9cf1598a4491aa8a68014520ee4697b756d2317759b6d9dcfaa32d786187a403

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 3d9cddd5aacfc30440f25237a8cc00b69f176f808a6bdb7d4396344f3e9ba7ae

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 4165dcb02843792359fcff6ed153517f8555a83d2d652550ebb0cabddf519e5b

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 58cd50d692e93e480e021eb56d123221877d752aeb3722db02253c8faee12042

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f3bb3138b3d58c71ddb5797d7a1e351b340a154becf520b12f5defd9ed12fba3

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 2dcf09804c242260e93aabc7cf8548c94adf54788cfc970db0a99eae30411a29

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d8a93f38eddd8df6113e032f7b8be0fd17a843091e30b7135d7c34202bad3522

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b1e2bce447caf34c0ec87fbd1d2cdc5a32e3413db3aeeccf29f28b9cc62b1677

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 419caa69c456cb63c7fab291c99a51318aae453a97d6f7de5867aec36ea2b515

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ed00cae7134aab4f0d559c059ebcdbe717e674f0984b59936845019f4c0cc824

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ce38c714f8f0265786a07282c7be36da54859c7e01ddd3d3f2bfef447eb564c6

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f7e796ac048b95d4ffba9ccecf677659293ac695390cc94f7c4925d26c7f715c

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 71b4334c92e3f876ddce5a93f3bb5a5396b11ab85b2ef446f6ecb9f20e3f09a6

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d90f95410288f28267fce3bad919fb0c666396f41dfdc9b4c1c6c806b57664e3

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 91968485a3e18ec30a20661fce0c7740c4a76cc52ba9cf3d3a2a3e574afe8134

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 5fdbb9e454702b61c769fac09ca69f2f43114495cff98b7a6621a8d8fe1cf55c

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 1978686da547e350049c481865bbb05edf67b0817c6cbcb4f4a6e97ba3bd7b4c

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: af648b3a700163dd6c07856505605711b168d2ecbe99ac897d6398785bc8f007

Red Hat Enterprise Linux for ARM 64 8

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

aarch64

Judy-1.0.5-18.module+el8+2765+cfa4f87b.aarch64.rpm

SHA-256: ad91b391e8d7cda209f3fa037f34ac4730acb2c9c78f81be59d0ea39c1898ffe

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.aarch64.rpm

SHA-256: 258e7e9864e4bc7f94e5ad2d89042378d6e4cee8d8d3cfe3007c7aa1ca570c78

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.aarch64.rpm

SHA-256: 8dac3d16b779f27405dd2b096b09818018c8febb3dfe9b28b2b5cada1fdbda0f

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 1584f8425069983d169375885bb64468a009fab8d44ebb02000d44b6e14d4837

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 112aadd852156a0021451dc97564e0d8168fee9f3e201cd28d09d786bafcfe6a

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 3aa703ca948960e1913730107d30053269d9e9e2023a4cd9ec3648578fa2b328

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 1b07e9183f41c6b23c840078847fe9868e0b96480ace45fa5b05a64ccc285c07

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: e066536ef1c83e103af2bf9e0f61a004c02feb1ffe9d4fcca968598c6388578e

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 8cb4063cc3e8d17efef71b665981704a5c77493636e84ad40920f37973488992

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 2968922583a6dad6d9d9a4fb99a4abd61277ffe40f788475b98abdcbf3569b0d

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 49c437192aa6d618a56181aa811af420504f0a9b10b757bcca150f3afaa9bf5d

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: b3a852e1a3ebafb40aa1331896d81c5a9ae2b1f629120d3ba0838e5372929490

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: f90d04142555330ef70e585927ee1305133d274eb2a5a9b1456f9de867752aab

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: ca4cbb2e8cfb5c8ed689a9aad3545d12c47925913981505afe0eb656c6bcf8df

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 59544567c78d6ac757a50ac0f4be9b337949ef5047b5d58b27629c6643f71460

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 9e84879da8c94ecc7a5e26412ecaae93601444bf4d792057b57d0df584b0fbae

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 878a7753b0b33a2d4ed4ebfa34876c204e188cbb7c63359fa1c5489eac3edc2a

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: f78db0df5d8a527828f7358643e209ce291c65e7b6757e059e8fa84e59f9ab17

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 0a8c84ed66c65798cc895ae3930b647ad07667100b1330bf3178ef2e7c8492f2

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 0279bc2bd3fc1d8508d470af1fd9373372b40c2d9238586e6e5eeb4f0c5c58d1

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: bb5f0fd0746aed23a37f06d24e841e71e807aff5e9e2105b23010362bac6de79

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 9440736a3bcc351cf50c243360a0ff3fba818a94f437e4d1c36285e52311a211

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 2e108d25bbfbff8b9ba55238e81496a92f620f2422b6e6653326b26f025aa93e

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: e6cf3e576bc1a8ef5c461adab71084e36c037b960ced2aab2ec0b945174cacc2

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 58744ce9967eb24a7228df28aecd2e274ed150831e68fb2358cc4ee166707fd6

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 046904dc6b8f70a1a4372a4469aedfbf13d298e2d15142be5edfe09be68fae8d

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 51b2b16544b3344068c1a460995f620c33b1c545d9fa962ff004c07861ada6cc

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: f1d157032620a8bd849660b9a32956fff1531af1ff3c1c6fcb6bee0636c4c81a

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

aarch64

Judy-1.0.5-18.module+el8+2765+cfa4f87b.aarch64.rpm

SHA-256: ad91b391e8d7cda209f3fa037f34ac4730acb2c9c78f81be59d0ea39c1898ffe

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.aarch64.rpm

SHA-256: 258e7e9864e4bc7f94e5ad2d89042378d6e4cee8d8d3cfe3007c7aa1ca570c78

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.aarch64.rpm

SHA-256: 8dac3d16b779f27405dd2b096b09818018c8febb3dfe9b28b2b5cada1fdbda0f

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 1584f8425069983d169375885bb64468a009fab8d44ebb02000d44b6e14d4837

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 112aadd852156a0021451dc97564e0d8168fee9f3e201cd28d09d786bafcfe6a

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 3aa703ca948960e1913730107d30053269d9e9e2023a4cd9ec3648578fa2b328

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 1b07e9183f41c6b23c840078847fe9868e0b96480ace45fa5b05a64ccc285c07

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: e066536ef1c83e103af2bf9e0f61a004c02feb1ffe9d4fcca968598c6388578e

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 8cb4063cc3e8d17efef71b665981704a5c77493636e84ad40920f37973488992

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 2968922583a6dad6d9d9a4fb99a4abd61277ffe40f788475b98abdcbf3569b0d

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 49c437192aa6d618a56181aa811af420504f0a9b10b757bcca150f3afaa9bf5d

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: b3a852e1a3ebafb40aa1331896d81c5a9ae2b1f629120d3ba0838e5372929490

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: f90d04142555330ef70e585927ee1305133d274eb2a5a9b1456f9de867752aab

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: ca4cbb2e8cfb5c8ed689a9aad3545d12c47925913981505afe0eb656c6bcf8df

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 59544567c78d6ac757a50ac0f4be9b337949ef5047b5d58b27629c6643f71460

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 9e84879da8c94ecc7a5e26412ecaae93601444bf4d792057b57d0df584b0fbae

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 878a7753b0b33a2d4ed4ebfa34876c204e188cbb7c63359fa1c5489eac3edc2a

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: f78db0df5d8a527828f7358643e209ce291c65e7b6757e059e8fa84e59f9ab17

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 0a8c84ed66c65798cc895ae3930b647ad07667100b1330bf3178ef2e7c8492f2

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 0279bc2bd3fc1d8508d470af1fd9373372b40c2d9238586e6e5eeb4f0c5c58d1

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: bb5f0fd0746aed23a37f06d24e841e71e807aff5e9e2105b23010362bac6de79

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 9440736a3bcc351cf50c243360a0ff3fba818a94f437e4d1c36285e52311a211

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 2e108d25bbfbff8b9ba55238e81496a92f620f2422b6e6653326b26f025aa93e

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: e6cf3e576bc1a8ef5c461adab71084e36c037b960ced2aab2ec0b945174cacc2

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 58744ce9967eb24a7228df28aecd2e274ed150831e68fb2358cc4ee166707fd6

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 046904dc6b8f70a1a4372a4469aedfbf13d298e2d15142be5edfe09be68fae8d

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: 51b2b16544b3344068c1a460995f620c33b1c545d9fa962ff004c07861ada6cc

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.aarch64.rpm

SHA-256: f1d157032620a8bd849660b9a32956fff1531af1ff3c1c6fcb6bee0636c4c81a

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

ppc64le

Judy-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: e784fa218dfe9e225caff5a29d988b7e5a0817dc2a67c59412f954482f8cacdf

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: 7d703e673d669a38b5242f6fe8e799f6aa07d0313f4dd6fd26d56fa849f2cc90

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.ppc64le.rpm

SHA-256: 5ff324427bd56c8f408cadfd25f697d8e004f1222ba10f38fc81f9df40a1f9d2

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: c31e0b9d9d2418a94f3d5eb3a7efc024b4d486182c6f42dde981774c78e692e7

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 7c10b075a2ec0beb6f17518373143c245292af1738c21288d088aecf2c6c1752

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: b3724ace11bd965d83780ba3649a194da4dcf0056bb1633eadbd17ca88fa5a18

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 1b83e93cd963cfdcf6646595679e77d9fa079e0184926c55f845b3d72dbdb90c

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 2b52a98ff7b10e2ae0e9da11146a9500ca7f73f998d3b2f11e6630b405a9cf49

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 3bc8f23dadd595606b07f9ba20a2a04f3e2cd2ac7afd53f43a49144de48161e7

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 6a2893e18683bb007782e0746be17560241120857e665e290bbc0f148283ffa5

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 2a38358031788da5f85e74cc669faec369f2c0765afe41e5df80dd139049b17f

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: bc2cec0cabbd05da40d7e80b094ee5ff767bda35be1f97d3a85ad2f232251340

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: bee0f76fcf4dc3fbea35b78bced26a78784d82b9bd6465b6510d6e008fe20507

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 794185d1b68357dd81fb524b784e36a33150544680353f4150899b89de640db5

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 236950a07aae6ab0adeaaec2f5affe446243d344948c7a4c0d60a1c23304fe2d

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 6582386c0b495daebce4cb6a706b3b5facfd171eb8f42ceb1d603e27d95149bf

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: de886e71b7f174090079f0f5e7322c15253b05db88dca765d5c4623cc5d54e6c

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 3307862b3786a8543595af7a304e69631aad2e88204187239c088e8ee87f679a

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: cbb786a8e964bd5c3b3801464897fb31fc72016442b3995949c2cecd609e7541

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 54d957cf237e2d066c30aa889df3754ea4174b562407133f665b9e864673bf90

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 70127cfc5fbe8cc1ccaf40329280bc340da5bdda73e33b27c6891cb48ddf6d4a

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: eaa8325bfe798bffe5dbaff1e58ae4323b312be05ae09c7c7b4495ffc3963ad6

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 58f32ac55ffdc824d009bbc3d1d695089c5ccda5dfdd7880fbb8023adfd38411

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: af2ead5fea1fb127dee36575705b9953543f689fb52f814aa82725bdb1bba72c

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: eb3fb1af17f0682c1536b730fc55eb6b9f0d1e44bbc2cbbed1122257cc4c767d

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: f89d222934c0b29e5063a3f8bcce31a0c93690c122c8a818a1683fd3db85f50d

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: b4ef2d3be13d64b1d3b21d458a2d70d8cb9fa7bf318f87f94a17ea5536725f57

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.ppc64le.rpm

SHA-256: 75c3ba5cce5e0dcc9c031b51d574b5f867c3389b71a2a28f3099dc3382aeba14

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

Judy-1.0.5-18.module+el8+2765+cfa4f87b.src.rpm

SHA-256: bd2eba6fcd7c08e2e5397e7b702e8f7b6a4db0937eb74c5a086dfd8d855c5b9d

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: f67dcd9898caf8d4079bc608fc7f7d986babe7bd84f137d20eaa7d6a12644744

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.src.rpm

SHA-256: d28d16c4a9331f962c1c761068316fad81508656f476462f781dbe01a1f811af

x86_64

Judy-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 88a29f33354754a242d50476ca18bb99d2af3884742e4f31c276ebee7c69338a

Judy-debuginfo-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: f2ca433f1ce80240b1a4c7a66d967d877504b9d31264c774013f857ed2a05623

Judy-debugsource-1.0.5-18.module+el8+2765+cfa4f87b.x86_64.rpm

SHA-256: 6d430b0e9a8de476437df76c6c876444cc0635c1d3ca27a157c7c13e16668f70

galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f6b9a5008016ff806167f3909eb69a4678a9a9bed56dc34162bbd240e6570985

galera-debuginfo-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 163d0bf0c1517b2fa4b28d612fd4761260e5b63cfa62ce1a47167947325ac560

galera-debugsource-25.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: fffb001f6814d10d89c7c511f6456638442a350896545fd6871f9206ce06575c

mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 287a5677f635b370a120bf9bf40d0f23d452d722989cc7ba4ef8c0b460b327de

mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b773a8042ba8f1b781b36284db4cd0c9737fb59412474fde3c66dbbe3af389b2

mariadb-backup-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 522fc7b60c7f8ba6a2ad894704cbe2ce6c19b5cba92023cc75d1b443bca807e0

mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 29acdfda9b432179a542e32e97f1d2c9c1047cce185ff1fa29af9349c6615ee5

mariadb-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 9cf1598a4491aa8a68014520ee4697b756d2317759b6d9dcfaa32d786187a403

mariadb-debugsource-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 3d9cddd5aacfc30440f25237a8cc00b69f176f808a6bdb7d4396344f3e9ba7ae

mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 4165dcb02843792359fcff6ed153517f8555a83d2d652550ebb0cabddf519e5b

mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 58cd50d692e93e480e021eb56d123221877d752aeb3722db02253c8faee12042

mariadb-embedded-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f3bb3138b3d58c71ddb5797d7a1e351b340a154becf520b12f5defd9ed12fba3

mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 2dcf09804c242260e93aabc7cf8548c94adf54788cfc970db0a99eae30411a29

mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d8a93f38eddd8df6113e032f7b8be0fd17a843091e30b7135d7c34202bad3522

mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: b1e2bce447caf34c0ec87fbd1d2cdc5a32e3413db3aeeccf29f28b9cc62b1677

mariadb-gssapi-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 419caa69c456cb63c7fab291c99a51318aae453a97d6f7de5867aec36ea2b515

mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ed00cae7134aab4f0d559c059ebcdbe717e674f0984b59936845019f4c0cc824

mariadb-oqgraph-engine-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: ce38c714f8f0265786a07282c7be36da54859c7e01ddd3d3f2bfef447eb564c6

mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: f7e796ac048b95d4ffba9ccecf677659293ac695390cc94f7c4925d26c7f715c

mariadb-server-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 71b4334c92e3f876ddce5a93f3bb5a5396b11ab85b2ef446f6ecb9f20e3f09a6

mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: d90f95410288f28267fce3bad919fb0c666396f41dfdc9b4c1c6c806b57664e3

mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 91968485a3e18ec30a20661fce0c7740c4a76cc52ba9cf3d3a2a3e574afe8134

mariadb-server-utils-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 5fdbb9e454702b61c769fac09ca69f2f43114495cff98b7a6621a8d8fe1cf55c

mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: 1978686da547e350049c481865bbb05edf67b0817c6cbcb4f4a6e97ba3bd7b4c

mariadb-test-debuginfo-10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64.rpm

SHA-256: af648b3a700163dd6c07856505605711b168d2ecbe99ac897d6398785bc8f007

Related news

Gentoo Linux Security Advisory 202405-25

Gentoo Linux Security Advisory 202405-25 - Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code. Versions greater than or equal to 10.11.3:10.11 are affected.

CVE-2023-28069: DSA-2022-258: Dell Streaming Data Platform Security Update for Multiple Third-Party Component Vulnerabilities

Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.

Ubuntu Security Notice USN-5739-1

Ubuntu Security Notice 5739-1 - Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.37 in Ubuntu 20.04 LTS and to 10.6.11 in Ubuntu 22.04 LTS and Ubuntu 22.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

RHSA-2022:7119: Red Hat Security Advisory: mysql:8.0 security, bug fix, and enhancement update

An update for the mysql:8.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2478: mysql: Server: DML unspecified vulnerability (CPU Oct 2021) * CVE-2021-2479: mysql: Server: DML unspecified vulnerability (CPU Oct 2021) * CVE-2021-2481: mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) * CVE-2021-35546: mysql: Server: Replication unspecified vulnerability (CPU Oct 2021) * CVE-2021-35575: mysql: Serve...

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

Red Hat Security Advisory 2022-6590-01

Red Hat Security Advisory 2022-6590-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries.

RHSA-2022:6590: Red Hat Security Advisory: mysql security, bug fix, and enhancement update

An update for mysql is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21412: mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) * CVE-2022-21413: mysql: Server: DML unspecified vulnerability (CPU Apr 2022) * CVE-2022-21414: mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) * CVE-2022-21415: mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) * CVE-2022-21417: mysql: InnoDB unsp...

Red Hat Security Advisory 2022-6518-01

Red Hat Security Advisory 2022-6518-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.

RHSA-2022:6518: Red Hat Security Advisory: rh-mysql80-mysql security, bug fix, and enhancement update

An update for rh-mysql80-mysql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2478: mysql: Server: DML unspecified vulnerability (CPU Oct 2021) * CVE-2021-2479: mysql: Server: DML unspecified vulnerability (CPU Oct 2021) * CVE-2021-2481: mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) * CVE-2021-35546: mysql: Server: Replication unspecified vulnerability (CPU Oct 2021) * CVE-2021-35575: mysql: Server:...

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6443-01

Red Hat Security Advisory 2022-6443-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-6306-01

Red Hat Security Advisory 2022-6306-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. Issues addressed include buffer overflow and use-after-free vulnerabilities.

RHSA-2022:6306: Red Hat Security Advisory: rh-mariadb103-galera and rh-mariadb103-mariadb security and bug fix update

An update for rh-mariadb103-galera and rh-mariadb103-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5948: Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update

An update for galera, mariadb, and mysql-selinux is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via cert...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5826: Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update

An update for the mariadb:10.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

RHSA-2022:5759: Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update

An update for rh-mariadb105-galera and rh-mariadb105-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46659: mariadb: Crash executing query with VIEW, aggregate and subquery * CVE-2021-46661: mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) * CVE-2021-46663: mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application ...

CVE-2022-32085: [MDEV-26407] Server crashes in Item_func_in::cleanup/Item::cleanup_processor

MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.

CVE-2022-32088: [MDEV-26419] A SEGV in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort

MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.

CVE-2022-32087: [MDEV-26437] Server crashes in Item_args::walk_args

MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.

CVE-2022-31623: MDEV-26561 Fix a bug due to unreleased lock by ryancaicse · Pull Request #1938 · MariaDB/server

MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock.

CVE-2022-31622: [MDEV-26561] An improper locking bug due to the unreleased lock

MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.

CVE-2022-21496: Oracle Critical Patch Update Advisory - April 2022

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...

CVE-2022-27449: [MDEV-28089] MariaDB SEGV issue - Jira

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.

CVE-2022-27458: [MDEV-28099] MariaDB UAP issue - Jira

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h.

CVE-2022-27445: [MDEV-28081] MariaDB SEGV issue - Jira

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.

CVE-2022-27456: [MDEV-28093] MariaDB UAP issue - Jira

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.

CVE-2022-27452: [MDEV-28090] MariaDB SEGV issue - Jira

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.

CVE-2022-27448: [MDEV-28095] crash in multi-update and implicit grouping

There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.

CVE-2022-27387: [MDEV-26422] ASAN: global-buffer-overflow in decimal_bin_size on SELECT

MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.

CVE-2022-27379: [MDEV-26353] MariaDB server crash in Arg_comparator::compare_real_fixed

An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27380: [MDEV-26280] MariaDB server crash at my_decimal::operator=

An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27381: [MDEV-26061] MariaDB server crash at Field::set_default

An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27378: [MDEV-26423] MariaDB server crash in Create_tmp_table::finalize

An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-27383: [MDEV-26323] use-after-poison issue of MariaDB server

MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.

CVE-2022-27376: [MDEV-26354] MariaDB server crash in Field::set_default - ASAN use after free in Item_args::walk_arg

MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.

CVE-2022-27386: [MDEV-26406] A SEGV in sql/sql_class.cc

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.

CVE-2022-27377: [MDEV-26281] ASAN use-after-poison when complex conversion is involved in blob

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.

CVE-2022-27386: [MDEV-26406] A SEGV in sql/sql_class.cc

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.

CVE-2022-27384: [MDEV-26047] MariaDB server crash at Item_subselect::init_expr_cache_tracker

An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24048: ZDI-22-363

MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24050: ZDI-22-364

MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.

CVE-2021-46668: [MDEV-25787] Bug report: crash on SELECT DISTINCT thousands_blob_fields

MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.

CVE-2021-46665: [MDEV-25636] Bug report: abortion in sql/sql_parse.cc:6294

MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.

CVE-2021-46664: [MDEV-25761] Assertion `aggr != __null' failed in sub_select_postjoin_aggr

MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.

CVE-2021-46661: [MDEV-25766] Unused CTE lead to a crash in find_field_in_tables/find_order_in_list

MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).

CVE-2021-46663: [MDEV-26351] segfault - (MARIA_HA *) 0x0 in ha_maria::extra

MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.

CVE-2021-46669: [MDEV-25638] Assertion `!result' failed in convert_const_to_int

MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.

CVE-2021-46659: [MDEV-25631] Crash executing query with VIEW, aggregate and subquery

MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.