mariadb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mariadb package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<10.6.9-r0
  • H
CVE-2022-32084

<10.6.9-r0
  • H
Use After Free

<10.6.8-r0
  • H
Reachable Assertion

<10.6.9-r0
  • H
Reachable Assertion

<10.6.8-r0
  • H
CVE-2022-27452

<10.6.8-r0
  • H
Use After Free

<10.6.9-r0
  • H
Use After Free

<10.6.8-r0
  • H
Out-of-bounds Write

<10.6.9-r0
  • H
CVE-2022-32089

<10.6.9-r0
  • H
Reachable Assertion

<10.6.8-r0
  • M
Integer Overflow or Wraparound

<10.6.7-r0
  • M
Improper Locking

<10.6.7-r0
  • H
CVE-2022-27451

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
CVE-2022-27449

<10.6.8-r0
  • M
Improper Locking

<10.6.7-r0
  • H
CVE-2022-27445

<10.6.8-r0
  • H
Use of Externally-Controlled Format String

<10.6.7-r0
  • H
SQL Injection

<10.6.8-r0
  • H
Use After Free

<10.6.7-r0
  • M
CVE-2021-46661

<10.6.7-r0
  • M
Resource Exhaustion

<10.6.7-r0
  • H
OS Command Injection

<10.5.9-r0
  • M
CVE-2020-14765

<10.5.8-r0
  • H
Use After Free

<10.6.8-r0
  • M
CVE-2020-14812

<10.5.8-r0
  • H
SQL Injection

<10.6.8-r0
  • M
CVE-2021-46662

<10.6.7-r0
  • M
Improper Locking

<10.6.7-r0
  • H
Use After Free

<10.6.8-r0
  • H
Buffer Overflow

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • M
CVE-2019-2739

<10.4.7-r0
  • M
CVE-2019-2737

<10.4.7-r0
  • H
Use After Free

<10.6.8-r0
  • M
CVE-2021-2166

<10.5.11-r0
  • H
CVE-2022-27444

<10.6.8-r0
  • C
Improper Input Validation

<10.5.6-r0
  • M
CVE-2021-2154

<10.5.11-r0
  • M
Improper Locking

<10.6.7-r0
  • M
NULL Pointer Dereference

<10.6.7-r0
  • M
CVE-2019-2740

<10.4.7-r0
  • H
SQL Injection

<10.6.7-r0
  • M
CVE-2020-14776

<10.5.8-r0
  • H
Heap-based Buffer Overflow

<10.6.7-r0
  • H
SQL Injection

<10.6.8-r0
  • M
CVE-2019-2805

<10.4.7-r0
  • H
SQL Injection

<10.6.8-r0
  • M
CVE-2019-2758

<10.4.7-r0
  • M
CVE-2021-46663

<10.6.7-r0
  • M
CVE-2021-46665

<10.6.7-r0
  • H
CVE-2022-27446

<10.6.8-r0
  • H
Stack-based Buffer Overflow

<10.6.7-r0
  • M
CVE-2021-46659

<10.6.7-r0
  • M
CVE-2021-2389

<10.6.4-r0
  • M
CVE-2019-2974

<10.4.10-r0
  • M
CVE-2020-14789

<10.5.8-r0
  • M
CVE-2021-2372

<10.6.4-r0
  • M
CVE-2019-2938

<10.4.10-r0
  • M
CVE-2020-2812

<10.4.13-r0
  • M
CVE-2018-3251

<10.3.11-r0
  • M
CVE-2019-2627

<10.3.15-r0
  • M
CVE-2018-3143

<10.3.11-r0
  • M
CVE-2019-2537

<10.3.13-r0
  • M
CVE-2019-2628

<10.3.15-r0
  • M
CVE-2018-2819

<10.2.15-r0
  • M
CVE-2018-2817

<10.2.15-r0
  • M
CVE-2018-2759

<10.2.15-r0
  • M
CVE-2018-3174

<10.3.11-r0
  • M
CVE-2019-2510

<10.3.13-r0
  • M
CVE-2018-3162

<10.3.11-r0
  • M
CVE-2019-2614

<10.3.15-r0
  • M
CVE-2018-2781

<10.2.15-r0
  • M
CVE-2018-3277

<10.3.11-r0
  • H
CVE-2018-2755

<10.2.15-r0
  • M
CVE-2020-2752

<10.4.13-r0
  • M
CVE-2018-3185

<10.3.11-r0
  • M
CVE-2018-3173

<10.3.11-r0
  • M
CVE-2018-3200

<10.3.11-r0
  • M
CVE-2018-2761

<10.2.15-r0
  • M
CVE-2018-3282

<10.3.11-r0
  • M
CVE-2018-2777

<10.2.15-r0
  • M
CVE-2018-2766

<10.2.15-r0
  • M
CVE-2018-3156

<10.3.11-r0
  • M
CVE-2020-2574

<10.4.12-r0
  • M
CVE-2018-2813

<10.2.15-r0
  • M
CVE-2018-2787

<10.2.15-r0
  • M
CVE-2020-2814

<10.4.13-r0
  • M
CVE-2018-2771

<10.2.15-r0
  • M
CVE-2018-2784

<10.2.15-r0
  • M
CVE-2018-2810

<10.2.15-r0
  • M
CVE-2020-2760

<10.4.13-r0
  • M
CVE-2023-22084

<10.11.6-r0
  • H
Use After Free

<10.1.22-r0
  • M
CVE-2018-2782

<10.2.15-r0
  • M
CVE-2017-3317

<10.1.21-r0
  • M
CVE-2017-3318

<10.1.21-r0
  • M
CVE-2018-2786

<10.2.15-r0
  • M
Information Exposure

<10.1.22-r0
  • M
CVE-2017-3291

<10.1.21-r0
  • M
CVE-2018-3284

<10.3.11-r0
  • C
Numeric Errors

<10.3.11-r0
  • M
CVE-2017-3312

<10.1.21-r0
  • M
Improper Input Validation

<10.1.21-r0
  • M
Improper Privilege Management

<10.1.21-r0
  • M
CVE-2017-3265

<10.1.21-r0
  • M
CVE-2017-3243

<10.1.21-r0
  • M
CVE-2024-21096

<10.11.8-r0
  • H
Link Following

<10.1.21-r0
  • M
CVE-2017-3238

<10.1.21-r0
  • M
CVE-2017-3244

<10.1.21-r0