mariadb-embedded-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mariadb-embedded-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

<3:10.5.22-1.el9_2
  • H
NULL Pointer Dereference

<3:10.5.22-1.el9_2
  • H
Improper Locking

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Reachable Assertion

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • M
Improper Locking

<3:10.5.16-2.el9_0
  • M
Improper Resource Shutdown or Release

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
CVE-2022-27445

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
Out-of-Bounds

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Heap-based Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Buffer Overflow

<3:10.5.16-2.el9_0
  • M
CVE-2022-21595

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Resource Exhaustion

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
NULL Pointer Dereference

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
CVE-2024-21096

*
  • H
Resource Exhaustion

<3:10.5.22-1.el9_0
  • H
Resource Exhaustion

<3:10.5.22-1.el9_0
  • M
CVE-2023-22084

*
  • H
Resource Exhaustion

<3:10.5.22-1.el9_2
  • H
Resource Exhaustion

<3:10.5.22-1.el9_2
  • H
Resource Exhaustion

<3:10.5.22-1.el9_2
  • H
Resource Exhaustion

<3:10.5.22-1.el9_2
  • H
NULL Pointer Dereference

<3:10.5.22-1.el9_2
  • H
NULL Pointer Dereference

<3:10.5.22-1.el9_2
  • H
NULL Pointer Dereference

<3:10.5.22-1.el9_2
  • H
NULL Pointer Dereference

<3:10.5.22-1.el9_2
  • M
CVE-2022-21595

<3:10.5.16-2.el9_0
  • M
CVE-2022-21595

<3:10.5.16-2.el9_0
  • M
CVE-2022-21595

<3:10.5.16-2.el9_0
  • M
CVE-2022-21595

<3:10.5.16-2.el9_0
  • M
CVE-2022-21595

<3:10.5.16-2.el9_0
  • M
CVE-2022-21595

<3:10.5.16-2.el9_0
  • H
Improper Locking

<3:10.5.22-1.el9_2
  • H
Improper Locking

<3:10.5.22-1.el9_2
  • H
Improper Locking

<3:10.5.22-1.el9_2
  • H
Improper Locking

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • M
Improper Handling of Values

*
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Improper Handling of Values

<3:10.5.22-1.el9_2
  • H
Reachable Assertion

<3:10.5.22-1.el9_2
  • H
Reachable Assertion

<3:10.5.22-1.el9_2
  • H
Reachable Assertion

<3:10.5.22-1.el9_2
  • H
Reachable Assertion

<3:10.5.22-1.el9_2
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Locking

<3:10.5.16-2.el9_0
  • M
Improper Locking

<3:10.5.16-2.el9_0
  • M
Improper Locking

<3:10.5.16-2.el9_0
  • M
Improper Locking

<3:10.5.16-2.el9_0
  • M
Improper Locking

<3:10.5.16-2.el9_0
  • M
Improper Locking

<3:10.5.16-2.el9_0
  • M
Improper Resource Shutdown or Release

<3:10.5.16-2.el9_0
  • M
Improper Resource Shutdown or Release

<3:10.5.16-2.el9_0
  • M
Improper Resource Shutdown or Release

<3:10.5.16-2.el9_0
  • M
Improper Resource Shutdown or Release

<3:10.5.16-2.el9_0
  • M
Improper Resource Shutdown or Release

<3:10.5.16-2.el9_0
  • M
Improper Resource Shutdown or Release

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
CVE-2022-27445

<3:10.5.16-2.el9_0
  • M
CVE-2022-27445

<3:10.5.16-2.el9_0
  • M
CVE-2022-27445

<3:10.5.16-2.el9_0
  • M
CVE-2022-27445

<3:10.5.16-2.el9_0
  • M
CVE-2022-27445

<3:10.5.16-2.el9_0
  • M
CVE-2022-27445

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
Out-of-Bounds

<3:10.5.16-2.el9_0
  • M
Out-of-Bounds

<3:10.5.16-2.el9_0
  • M
Out-of-Bounds

<3:10.5.16-2.el9_0
  • M
Out-of-Bounds

<3:10.5.16-2.el9_0
  • M
Out-of-Bounds

<3:10.5.16-2.el9_0
  • M
Out-of-Bounds

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
SQL Injection

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Reachable Assertion

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Improper Use of Validation Framework

<3:10.5.16-2.el9_0
  • M
Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Heap-based Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Heap-based Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Heap-based Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Heap-based Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Heap-based Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Heap-based Buffer Overflow

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Use After Free

<3:10.5.16-2.el9_0
  • M
Resource Exhaustion

<3:10.5.16-2.el9_0
  • M
Resource Exhaustion

<3:10.5.16-2.el9_0
  • M
Resource Exhaustion

<3:10.5.16-2.el9_0
  • M
Resource Exhaustion

<3:10.5.16-2.el9_0
  • M
Resource Exhaustion

<3:10.5.16-2.el9_0
  • M
Resource Exhaustion

<3:10.5.16-2.el9_0
  • M
NULL Pointer Dereference

<3:10.5.16-2.el9_0
  • M
NULL Pointer Dereference

<3:10.5.16-2.el9_0
  • M
NULL Pointer Dereference

<3:10.5.16-2.el9_0
  • M
NULL Pointer Dereference

<3:10.5.16-2.el9_0
  • M
NULL Pointer Dereference

<3:10.5.16-2.el9_0
  • M
NULL Pointer Dereference

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • L
Improper Input Validation

*
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0
  • M
Improper Input Validation

<3:10.5.16-2.el9_0