Name | CVE-2022-27376 |
Description | MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3114-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mariadb-10.5 (PTS) | bullseye | 1:10.5.23-0+deb11u1 | fixed |
| bullseye (security) | 1:10.5.26-0+deb11u2 | fixed |
The information below is based on the following data on fixed versions.
Notes
- mariadb-10.1 <not-affected> (vulnerable code not present; virtual column needed changes introduced in 10.2; moreover exploit does not work and fail with syntax error)
Bug MariaDB: https://jira.mariadb.org/browse/MDEV-26354
Bug MariaDB (duplicate): https://jira.mariadb.org/browse/MDEV-26437
Bug MariaDB (main): https://jira.mariadb.org/browse/MDEV-24176
Same fix than CVE-2022-27379, CVE-2022-27447, CVE-2022-27449, CVE-2022-27452, CVE-2022-27456
Fixed in MariaDB version 10.3.35, 10.4.25, 10.5.16, 10.6.8, 10.7.4
Virtual column vulnerable code introduced in 10.2: https://mariadb.com/kb/en/changes-improvements-in-mariadb-10-2/
Commit MariaDB [1/3] https://github.com/MariaDB/server/commit/c02ebf3510850ba78a106be9974c94c3b97d8585
Commit MariaDB [2/3] https://github.com/MariaDB/server/commit/08c7ab404f69d9c4ca6ca7a9cf7eec74c804f917
Commit MariaDB [3/3] https://github.com/MariaDB/server/commit/b3c3291f0b7c1623cb20663f7cf31b7f749768bc