CVE-2022-27376

NameCVE-2022-27376
DescriptionMariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3114-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mariadb-10.5 (PTS)bullseye1:10.5.23-0+deb11u1fixed
bullseye (security)1:10.5.26-0+deb11u2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mariadb-10.1source(unstable)(not affected)
mariadb-10.3sourcebuster1:10.3.36-0+deb10u1DLA-3114-1
mariadb-10.3source(unstable)(unfixed)
mariadb-10.5sourcebullseye1:10.5.18-0+deb11u1
mariadb-10.5source(unstable)(unfixed)
mariadb-10.6source(unstable)1:10.6.8-1

Notes

- mariadb-10.1 <not-affected> (vulnerable code not present; virtual column needed changes introduced in 10.2; moreover exploit does not work and fail with syntax error)
Bug MariaDB: https://jira.mariadb.org/browse/MDEV-26354
Bug MariaDB (duplicate): https://jira.mariadb.org/browse/MDEV-26437
Bug MariaDB (main): https://jira.mariadb.org/browse/MDEV-24176
Same fix than CVE-2022-27379, CVE-2022-27447, CVE-2022-27449, CVE-2022-27452, CVE-2022-27456
Fixed in MariaDB version 10.3.35, 10.4.25, 10.5.16, 10.6.8, 10.7.4
Virtual column vulnerable code introduced in 10.2: https://mariadb.com/kb/en/changes-improvements-in-mariadb-10-2/
Commit MariaDB [1/3] https://github.com/MariaDB/server/commit/c02ebf3510850ba78a106be9974c94c3b97d8585
Commit MariaDB [2/3] https://github.com/MariaDB/server/commit/08c7ab404f69d9c4ca6ca7a9cf7eec74c804f917
Commit MariaDB [3/3] https://github.com/MariaDB/server/commit/b3c3291f0b7c1623cb20663f7cf31b7f749768bc

Search for package or bug name: Reporting problems