First published: Tue Apr 12 2022(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mariadb Mariadb | >=10.2.0<10.2.44 | |
Mariadb Mariadb | >=10.3.0<10.3.35 | |
Mariadb Mariadb | >=10.4.0<10.4.25 | |
Mariadb Mariadb | >=10.5.0<10.5.16 | |
Mariadb Mariadb | >=10.6.0<10.6.8 | |
Mariadb Mariadb | >=10.7.0<10.7.4 | |
Debian Debian Linux | =10.0 | |
redhat/mariadb | <10.7.4 | 10.7.4 |
redhat/mariadb | <10.6.8 | 10.6.8 |
redhat/mariadb | <10.5.16 | 10.5.16 |
redhat/mariadb | <10.4.25 | 10.4.25 |
redhat/mariadb | <10.3.35 | 10.3.35 |
redhat/mariadb | <10.2.44 | 10.2.44 |
debian/mariadb-10.5 | 1:10.5.23-0+deb11u1 1:10.5.26-0+deb11u2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-27377.
The severity of CVE-2022-27377 is high with a CVSS score of 7.5.
MariaDB Server versions 10.2.0 to 10.2.44, 10.3.0 to 10.3.35, 10.4.0 to 10.4.25, 10.5.0 to 10.5.16, and 10.6.0 to 10.6.8 are affected by CVE-2022-27377.
CVE-2022-27377 can be exploited through specially crafted SQL statements that trigger a use-after-free vulnerability in the MariaDB Server component Item_func_in::cleanup().
Yes, patches are available for CVE-2022-27377. It is recommended to update to MariaDB Server version 10.7.4, 10.6.8, 10.5.16, 10.4.25, or 10.3.35 to mitigate this vulnerability.