First published: Tue Feb 01 2022(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mariadb | <10.2.44 | 10.2.44 |
redhat/mariadb | <10.3.35 | 10.3.35 |
redhat/mariadb | <10.4.25 | 10.4.25 |
redhat/mariadb | <10.5.16 | 10.5.16 |
redhat/mariadb | <10.6.8 | 10.6.8 |
redhat/mariadb | <10.7.4 | 10.7.4 |
debian/mariadb-10.5 | 1:10.5.23-0+deb11u1 1:10.5.26-0+deb11u2 | |
Mariadb Mariadb | <10.2.44 | |
Mariadb Mariadb | >=10.3.0<10.3.35 | |
Mariadb Mariadb | >=10.4.0<10.4.25 | |
Mariadb Mariadb | >=10.5.0<10.5.16 | |
Mariadb Mariadb | >=10.6.0<10.6.8 | |
Mariadb Mariadb | >=10.7.0<10.7.4 | |
Fedora | =35 | |
Fedora | =36 | |
Debian | =10.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46669 is a vulnerability in MariaDB through version 10.5.9 that allows attackers to trigger a use-after-free when the BIGINT data type is used.
CVE-2021-46669 has a severity score of 7.5 out of 10.
CVE-2021-46669 affects MariaDB versions 10.2.44 to 10.5.9.
To fix CVE-2021-46669, update MariaDB to version 10.5.10 or later.
More information about CVE-2021-46669 can be found in the following references: [Link 1](https://jira.mariadb.org/browse/MDEV-25638), [Link 2](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html), [Link 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/).