CVE-2022-27378
📋 TL;DR
This vulnerability in MariaDB Server allows attackers to cause Denial of Service (DoS) by sending specially crafted SQL statements that trigger a flaw in the Create_tmp_table::finalize component. It affects MariaDB Server versions 10.7 and below. Database administrators and organizations running vulnerable MariaDB instances are impacted.
💻 Affected Systems
- MariaDB Server
📦 What is this software?
Mariadb by Mariadb
Mariadb by Mariadb
Mariadb by Mariadb
Mariadb by Mariadb
Mariadb by Mariadb
Mariadb by Mariadb
Mariadb by Mariadb
Mariadb by Mariadb
⚠️ Risk & Real-World Impact
Worst Case
Complete database service disruption, making applications dependent on MariaDB unavailable until service restart.
Likely Case
Database service crashes requiring manual restart, causing temporary application downtime.
If Mitigated
Minimal impact with proper network segmentation and access controls limiting who can execute SQL queries.
🎯 Exploit Status
Exploitation requires authenticated database access to execute crafted SQL statements. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: MariaDB 10.7.1 and later versions
Vendor Advisory: https://jira.mariadb.org/browse/MDEV-26423
Restart Required: Yes
Instructions:
1. Backup your database. 2. Upgrade MariaDB to version 10.7.1 or later. 3. Restart the MariaDB service. 4. Verify the upgrade was successful.
🔧 Temporary Workarounds
Restrict Database Access
allLimit which users and applications can execute SQL statements against MariaDB
Network Segmentation
allEnsure MariaDB is not directly accessible from untrusted networks
🧯 If You Can't Patch
- Implement strict database user privilege management to minimize attack surface
- Deploy network-based intrusion detection to monitor for unusual SQL query patterns
🔍 How to Verify
Check if Vulnerable:
Check MariaDB version: If version is 10.7 or below, the system is vulnerable.
Check Version:
mysql --version
Verify Fix Applied:
After patching, verify MariaDB version is 10.7.1 or higher and service is running normally.
📡 Detection & Monitoring
Log Indicators:
- MariaDB service crashes
- Error logs showing abnormal SQL query failures
- Repeated connection failures
Network Indicators:
- Unusual SQL query patterns from single sources
- Multiple failed SQL execution attempts
SIEM Query:
source="mariadb.log" AND ("crash" OR "segfault" OR "abnormal termination")
🔗 References
- https://jira.mariadb.org/browse/MDEV-26423
- https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://jira.mariadb.org/browse/MDEV-26423
- https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
- https://security.netapp.com/advisory/ntap-20220526-0004/