一、漏洞信息
漏洞编号:[CVE-2022-27379](https://nvd.nist.gov/vuln/detail/CVE-2022-27379)
漏洞归属组件:[mariadb](https://gitee.com/src-openeuler/mariadb)
漏洞归属的版本:10.3.34,10.3.9,10.5.10,10.5.15
CVSS V3.0分值:
BaseScore:7.5 High
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞简述:
An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
漏洞公开时间:2022-04-13 04:15
漏洞创建时间:2022-05-12 10:34:31
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2022-27379
<details>
<summary>更多参考(点击展开)</summary>
| 参考来源 | 参考链接 | 来源链接 |
| ------- | -------- | -------- |
| MISC | https://jira.mariadb.org/browse/MDEV-26353 | |
| CONFIRM | https://security.netapp.com/advisory/ntap-20220526-0005/ | |
| nvd | https://access.redhat.com/security/cve/CVE-2022-27379 | |
| suse_bugzilla | https://jira.mariadb.org/browse/MDEV-26353 | |
| suse_bugzilla | https://bugzilla.redhat.com/show_bug.cgi?id=2074951 | |
| suse_bugzilla | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27379 | |
| suse_bugzilla | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379 | |
| ubuntu | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379 | |
| ubuntu | https://jira.mariadb.org/browse/MDEV-26353 | |
| ubuntu | https://nvd.nist.gov/vuln/detail/CVE-2022-27379 | |
| ubuntu | https://launchpad.net/bugs/cve/CVE-2022-27379 | |
| ubuntu | https://security-tracker.debian.org/tracker/CVE-2022-27379 | |
| debian | https://security-tracker.debian.org/tracker/CVE-2022-27379 | |
</details>
漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:
<details>
<summary>详情(点击展开)</summary>
无
</details>
二、漏洞分析结构反馈
影响性分析说明:
MariaDB Server v10.6.2及以下版本的组件Arg_comparator::compare_real_fixed中发现了一个问题,允许攻击者通过特制的SQL语句导致拒绝服务(DoS)。上游分别在10.3.35及10.5.16版本中修复
openEuler评分:
7.5
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(10.3.35):受影响
2.openEuler-20.03-LTS-SP3(10.3.35):受影响
3.openEuler-22.03-LTS(10.5.16):受影响
修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(10.3.35):否
2.openEuler-20.03-LTS-SP3(10.3.35):否
3.openEuler-22.03-LTS(10.5.16):否
三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2022-1681