First published: Wed May 25 2022(Updated: )
MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mariadb Mariadb | <10.2.41 | |
Mariadb Mariadb | >=10.3.0<10.3.32 | |
Mariadb Mariadb | >=10.4.0<10.4.22 | |
Mariadb Mariadb | >=10.5.0<10.5.13 | |
Mariadb Mariadb | >=10.6.0<10.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31624 is a vulnerability in MariaDB Server before 10.7 that allows local users to trigger a denial of service due to a deadlock.
CVE-2022-31624 has a severity rating of 5.5, which is considered medium.
MariaDB versions 10.2.41 to 10.6.5 on Apple macOS Monterey are affected by CVE-2022-31624.
To fix CVE-2022-31624, users should update to MariaDB Server 10.7 or apply the relevant patches provided by MariaDB.
Yes, you can find references for CVE-2022-31624 in the following links: [link1], [link2], [link3].