Name | CVE-2022-27379 |
Description | An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3114-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mariadb-10.5 (PTS) | bullseye | 1:10.5.23-0+deb11u1 | fixed |
| bullseye (security) | 1:10.5.26-0+deb11u2 | fixed |
The information below is based on the following data on fixed versions.
Notes
- mariadb-10.1 <not-affected> (vulnerable code not present; virtual column needed changes introduced in 10.2; moreover exploit does not work and fail with syntax error)
MariaDB bug: https://jira.mariadb.org/browse/MDEV-26353
MariaDB bug (main): https://jira.mariadb.org/browse/MDEV-24176
Same fix than CVE-2022-27376, CVE-2022-27447, CVE-2022-27449, CVE-2022-27452, CVE-2022-27456
Fixed in MariaDB version 10.3.35, 10.4.25, 10.5.16, 10.6.8, 10.7.4
Virtual column vulnerable code introduced in 10.2: https://mariadb.com/kb/en/changes-improvements-in-mariadb-10-2/