CVE Vulnerabilities

CVE-2022-31624

Improper Locking

Published: May 25, 2022 | Modified: Aug 08, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.

Weakness

The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.

Affected Software

Name Vendor Start Version End Version
Mariadb Mariadb * 10.2.41 (excluding)
Mariadb Mariadb 10.3.0 (including) 10.3.32 (excluding)
Mariadb Mariadb 10.4.0 (including) 10.4.22 (excluding)
Mariadb Mariadb 10.5.0 (including) 10.5.13 (excluding)
Mariadb Mariadb 10.6.0 (including) 10.6.5 (excluding)
Red Hat Enterprise Linux 8 RedHat mariadb:10.3-8050020220204122328.c5368500 *
Red Hat Enterprise Linux 8 RedHat mariadb:10.5-8050020220204122540.c5368500 *
Red Hat Enterprise Linux 8.4 Extended Update Support RedHat mariadb:10.3-8040020220429075504.522a0ee4 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-mariadb105-galera-0:26.4.9-3.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-mariadb105-mariadb-3:10.5.13-1.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-mariadb103-galera-0:25.3.34-4.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-mariadb103-mariadb-3:10.3.32-2.el7 *
Mariadb-10.1 Ubuntu bionic *
Mariadb-10.3 Ubuntu focal *
Mariadb-10.5 Ubuntu impish *
Mariadb-10.6 Ubuntu kinetic *
Mariadb-10.6 Ubuntu lunar *

Extended Description

Locking is a type of synchronization behavior that ensures that multiple independently-operating processes or threads do not interfere with each other when accessing the same resource. All processes/threads are expected to follow the same steps for locking. If these steps are not followed precisely - or if no locking is done at all - then another process/thread could modify the shared resource in a way that is not visible or predictable to the original process. This can lead to data or memory corruption, denial of service, etc.

Potential Mitigations

References