CVE Vulnerabilities

CVE-2022-38791

Improper Locking

Published: Aug 27, 2022 | Modified: Nov 07, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.

Weakness

The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.

Affected Software

Name Vendor Start Version End Version
Mariadb Mariadb 10.3.0 (including) 10.3.36 (excluding)
Mariadb Mariadb 10.4.0 (including) 10.4.26 (excluding)
Mariadb Mariadb 10.5.0 (including) 10.5.17 (excluding)
Mariadb Mariadb 10.6.0 (including) 10.6.9 (excluding)
Mariadb Mariadb 10.7.0 (including) 10.7.5 (excluding)
Mariadb Mariadb 10.8.0 (including) 10.8.4 (excluding)
Mariadb Mariadb 10.9.1 (including) 10.9.1 (including)
Red Hat Enterprise Linux 8 RedHat mariadb:10.3-8080020230814130040.63b34585 *
Red Hat Enterprise Linux 8 RedHat mariadb:10.5-8080020231003163755.63b34585 *
Red Hat Enterprise Linux 9 RedHat mariadb-3:10.5.22-1.el9_2 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-mariadb105-mariadb-3:10.5.22-1.el7 *
Mariadb-10.0 Ubuntu xenial *
Mariadb-10.1 Ubuntu bionic *
Mariadb-10.3 Ubuntu focal *
Mariadb-10.6 Ubuntu jammy *
Mariadb-10.6 Ubuntu upstream *
Mariadb-5.5 Ubuntu trusty *

Extended Description

Locking is a type of synchronization behavior that ensures that multiple independently-operating processes or threads do not interfere with each other when accessing the same resource. All processes/threads are expected to follow the same steps for locking. If these steps are not followed precisely - or if no locking is done at all - then another process/thread could modify the shared resource in a way that is not visible or predictable to the original process. This can lead to data or memory corruption, denial of service, etc.

Potential Mitigations

References