First published: Tue Apr 12 2022(Updated: )
An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mariadb Mariadb | >=10.3.0<10.3.35 | |
Mariadb Mariadb | >=10.4.0<10.4.25 | |
Mariadb Mariadb | >=10.5.0<10.5.16 | |
Mariadb Mariadb | >=10.6.0<10.6.8 | |
Mariadb Mariadb | >=10.7.0<10.7.4 | |
Debian Debian Linux | =10.0 | |
redhat/mariadb | <10.7.4 | 10.7.4 |
redhat/mariadb | <10.6.8 | 10.6.8 |
redhat/mariadb | <10.5.16 | 10.5.16 |
redhat/mariadb | <10.4.25 | 10.4.25 |
redhat/mariadb | <10.3.35 | 10.3.35 |
debian/mariadb-10.5 | 1:10.5.23-0+deb11u1 1:10.5.26-0+deb11u2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-27379.
The severity of CVE-2022-27379 is high with a CVSS score of 7.5.
The issue affects the Arg_comparator::compare_real_fixed component of MariaDB Server.
Attackers can exploit CVE-2022-27379 by using specially crafted SQL statements to cause a Denial of Service (DoS).
To mitigate the vulnerability, it is recommended to update to a fixed version of MariaDB Server, such as 10.7.4, 10.6.8, 10.5.16, 10.4.25, or 10.3.35.