Debian Package Tracker
Register | Log in
Subscribe

mariadb

Choose email to subscribe with

general
  • source: mariadb (main)
  • version: 1:11.8.1-5
  • maintainer: Debian MySQL Maintainers (archive) (DMD)
  • uploaders: Otto Kekäläinen [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 1:10.11.11-0+deb12u1
  • testing: 1:11.8.1-4
  • unstable: 1:11.8.1-5
versioned links
  • 1:10.11.11-0+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:11.8.1-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:11.8.1-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libmariadb-dev
  • libmariadb-dev-compat (1 bugs: 0, 1, 0, 0)
  • libmariadb3
  • libmariadbd-dev
  • libmariadbd19t64
  • mariadb-backup
  • mariadb-client (4 bugs: 0, 3, 1, 0)
  • mariadb-client-compat
  • mariadb-client-core
  • mariadb-common
  • mariadb-plugin-connect
  • mariadb-plugin-connect-jdbc
  • mariadb-plugin-cracklib-password-check
  • mariadb-plugin-gssapi-client
  • mariadb-plugin-gssapi-server
  • mariadb-plugin-hashicorp-key-management
  • mariadb-plugin-mroonga (1 bugs: 0, 1, 0, 0)
  • mariadb-plugin-oqgraph
  • mariadb-plugin-provider-bzip2
  • mariadb-plugin-provider-lz4
  • mariadb-plugin-provider-lzma
  • mariadb-plugin-provider-lzo
  • mariadb-plugin-provider-snappy
  • mariadb-plugin-rocksdb
  • mariadb-plugin-s3
  • mariadb-plugin-spider
  • mariadb-server (17 bugs: 0, 9, 8, 0)
  • mariadb-server-10.5 (2 bugs: 0, 1, 1, 0)
  • mariadb-server-compat
  • mariadb-server-core (2 bugs: 1, 1, 0, 0)
  • mariadb-test
  • mariadb-test-data
action needed
Debci reports failed tests high
  • unstable: pass (log)
    The tests ran in 0:04:31
    Last run: 2025-05-15T05:03:23.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:04:26
    Last run: 2025-05-16T20:57:37.000Z
    Previous status: unknown

  • stable: fail (log)
    The tests ran in 0:03:20
    Last run: 2025-05-12T20:28:56.000Z
    Previous status: unknown

Created: 2025-03-30 Last update: 2025-05-29 15:31
lintian reports 3 errors and 47 warnings high
Lintian reports 3 errors and 47 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-24 Last update: 2025-05-27 16:32
5 security issues in trixie high

There are 5 open security issues in trixie.

5 important issues:
  • CVE-2023-52969: MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, and 11.0 through 11.0.* can sometimes crash with an empty backtrace log. This may be related to make_aggr_tables_info and optimize_stage2.
  • CVE-2023-52970: MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, 11.0 through 11.0.*, and 11.1 through 11.4.* crashes in Item_direct_view_ref::derived_field_transformer_for_where.
  • CVE-2023-52971: MariaDB Server 10.10 through 10.11.* and 11.0 through 11.4.* crashes in JOIN::fix_all_splittings_in_plan.
  • CVE-2025-30693: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
  • CVE-2025-30722: Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N).
Created: 2025-03-10 Last update: 2025-05-27 05:00
5 security issues in sid high

There are 5 open security issues in sid.

5 important issues:
  • CVE-2023-52969: MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, and 11.0 through 11.0.* can sometimes crash with an empty backtrace log. This may be related to make_aggr_tables_info and optimize_stage2.
  • CVE-2023-52970: MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, 11.0 through 11.0.*, and 11.1 through 11.4.* crashes in Item_direct_view_ref::derived_field_transformer_for_where.
  • CVE-2023-52971: MariaDB Server 10.10 through 10.11.* and 11.0 through 11.4.* crashes in JOIN::fix_all_splittings_in_plan.
  • CVE-2025-30693: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
  • CVE-2025-30722: Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N).
Created: 2025-03-10 Last update: 2025-05-27 05:00
1 bug tagged help in the BTS normal
The BTS contains 1 bug tagged help, please consider helping the maintainer in dealing with it.
Created: 2023-01-22 Last update: 2025-05-29 16:00
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-05-29 16:00
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-03-19 Last update: 2025-05-29 11:32
debian/patches: 8 patches to forward upstream low

Among the 18 debian patches available in version 1:11.8.1-5 of the package, we noticed the following issues:

  • 8 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2024-02-11 Last update: 2025-05-27 06:56
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2024-12-22 Last update: 2024-12-22 10:00
testing migrations
  • This package will soon be part of the auto-libxml2 transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for mariadb (1:11.8.1-4 to 1:11.8.1-5): BLOCKED: Needs an approval (either due to a freeze, the source suite or a manual hint)
    • Issues preventing migration:
    • ∙ ∙ blocked by freeze: is a key package (Follow the freeze policy when applying for an unblock)
    • ∙ ∙ Too young, only 2 of 20 days old
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/m/mariadb.html
    • ∙ ∙ autopkgtest for mariadb/1:11.8.1-5: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on armhf - info ♻
    • ∙ ∙ Waiting for reproducibility test results on i386 - info ♻
    • Not considered
news
[rss feed]
  • [2025-05-26] Accepted mariadb 1:11.8.1-5 (source) into unstable (Otto Kekäläinen)
  • [2025-05-04] mariadb 1:11.8.1-4 MIGRATED to testing (Debian testing watch)
  • [2025-04-23] Accepted mariadb 1:11.8.1-4 (source) into unstable (Otto Kekäläinen)
  • [2025-04-22] Accepted mariadb 1:11.8.1-3 (source) into unstable (Otto Kekäläinen)
  • [2025-03-23] mariadb 1:11.8.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-21] Accepted mariadb 1:11.8.1-2 (source) into unstable (Otto Kekäläinen)
  • [2025-03-19] Accepted mariadb 1:11.8.1-1 (source) into unstable (Otto Kekäläinen)
  • [2025-03-01] Accepted mariadb 1:10.11.11-0+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Otto Kekäläinen)
  • [2025-02-23] Accepted mariadb 1:11.4.5-2~exp1 (source) into experimental (Otto Kekäläinen)
  • [2025-02-22] mariadb 1:11.4.5-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-19] Accepted mariadb 1:11.4.5-1 (source) into unstable (Otto Kekäläinen)
  • [2025-01-17] mariadb 1:11.4.4-3 MIGRATED to testing (Debian testing watch)
  • [2025-01-13] Accepted mariadb 1:11.4.4-3 (source) into unstable (Otto Kekäläinen)
  • [2024-12-22] Accepted mariadb 1:11.4.4-2 (source) into unstable (Otto Kekäläinen)
  • [2024-12-16] Accepted mariadb 1:11.4.4-1 (source) into unstable (Otto Kekäläinen)
  • [2024-10-27] Accepted mariadb 1:10.11.9-0+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Otto Kekäläinen)
  • [2024-08-24] mariadb 1:11.4.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-19] Accepted mariadb 1:11.4.3-1 (source) into unstable (Otto Kekäläinen)
  • [2024-07-15] mariadb 1:11.4.2-4 MIGRATED to testing (Debian testing watch)
  • [2024-07-13] Accepted mariadb 1:11.4.2-4 (source) into unstable (Otto Kekäläinen)
  • [2024-07-08] Accepted mariadb 1:11.4.2-3 (source) into unstable (Otto Kekäläinen)
  • [2024-07-02] Accepted mariadb 1:11.4.2-2 (source) into unstable (Otto Kekäläinen)
  • [2024-06-30] Accepted mariadb 1:11.4.2-1 (source amd64 all) into unstable (Debian FTP Masters) (signed by: Otto Kekäläinen)
  • [2024-05-20] mariadb 1:10.11.8-1 MIGRATED to testing (Debian testing watch)
  • [2024-05-18] Accepted mariadb 1:10.11.8-1 (source) into unstable (Otto Kekäläinen)
  • [2024-05-03] mariadb 1:10.11.7-4 MIGRATED to testing (Debian testing watch)
  • [2024-04-13] Accepted mariadb 1:10.11.7-4 (source) into unstable (Otto Kekäläinen)
  • [2024-03-19] Accepted mariadb 1:10.11.7-3 (source) into unstable (Otto Kekäläinen)
  • [2024-03-02] Accepted mariadb 1:10.11.7-2 (source) into unstable (Otto Kekäläinen)
  • [2024-02-10] Accepted mariadb 1:10.11.7-1 (source) into unstable (Otto Kekäläinen)
  • 1
  • 2
bugs [bug history graph]
  • all: 45 48
  • RC: 1
  • I&N: 30 33
  • M&W: 12
  • F&P: 2
  • patch: 2
  • help: 1
links
  • homepage
  • lintian (3, 47)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (100, 93)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:11.8.1-4
  • 5 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing