CVE-2022-27447

NameCVE-2022-27447
DescriptionMariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3114-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mariadb-10.5 (PTS)bullseye1:10.5.23-0+deb11u1fixed
bullseye (security)1:10.5.26-0+deb11u2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mariadb-10.1source(unstable)(not affected)
mariadb-10.3sourcebuster1:10.3.36-0+deb10u1DLA-3114-1
mariadb-10.3source(unstable)(unfixed)
mariadb-10.5sourcebullseye1:10.5.18-0+deb11u1
mariadb-10.5source(unstable)(unfixed)
mariadb-10.6source(unstable)1:10.6.8-1

Notes

- mariadb-10.1 <not-affected> (vulnerable code not present; virtual column needed changes introduced in 10.2; moreover exploit does not work and fail with syntax error)
MariaDB bug: https://jira.mariadb.org/browse/MDEV-28099
MariaDB main bug: https://jira.mariadb.org/browse/MDEV-24176
Same fix than CVE-2022-27376, CVE-2022-27379 and CVE-2022-27449, CVE-2022-27452, CVE-2022-27456
Fixed in MariaDB 10.3.35, 10.4.25, 10.5.16, 10.6.8, 10.7.4, 10.8.3
Virtual column vulnerable code introduced in 10.2: https://mariadb.com/kb/en/changes-improvements-in-mariadb-10-2/
MariaDB commit: [1/3] https://github.com/MariaDB/server/commit/c02ebf3510850ba78a106be9974c94c3b97d8585 (mariadb-10.3.35)
MariaDB commit: [2/3] https://github.com/MariaDB/server/commit/08c7ab404f69d9c4ca6ca7a9cf7eec74c804f917 (mariadb-10.3.35)
MariaDB commit: [3/3] https://github.com/MariaDB/server/commit/b3c3291f0b7c1623cb20663f7cf31b7f749768bc (mariadb-10.3.35)

Search for package or bug name: Reporting problems