{"schema_version":"1.7.2","id":"OESA-2026-2396","modified":"2026-05-22T13:18:29Z","published":"2026-05-22T13:18:29Z","upstream":["CVE-2026-3494"],"summary":"mariadb security update","details":"MariaDB is a community developed fork from MySQL - a multi-user, multi-threaded SQL database server. It is a client/server implementation consisting of a server daemon (mariadbd) and many different client programs and libraries. The base package contains the standard MariaDB/MySQL client programs and utilities.\r\n\r\nSecurity Fix(es):\n\nIn MariaDB server version through 11.8.5, when server audit plugin is enabled with server_audit_events variable configured with QUERY_DCL, QUERY_DDL, or QUERY_DML filtering, if an authenticated database user invokes a SQL statement prefixed with double-hyphen (—) or hash (#) style comments, the statement is not logged.(CVE-2026-3494)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"mariadb","purl":"pkg:rpm/openEuler/mariadb&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.5.29-4.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["mariadb-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-backup-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-common-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-config-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-debuginfo-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-debugsource-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-devel-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-embedded-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-embedded-devel-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-errmsg-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-gssapi-server-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-oqgraph-engine-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-pam-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-rocksdb-engine-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-server-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-server-galera-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-server-utils-10.5.29-4.oe2403sp3.aarch64.rpm","mariadb-test-10.5.29-4.oe2403sp3.aarch64.rpm"],"src":["mariadb-10.5.29-4.oe2403sp3.src.rpm"],"x86_64":["mariadb-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-backup-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-common-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-config-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-debuginfo-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-debugsource-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-devel-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-embedded-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-embedded-devel-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-errmsg-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-gssapi-server-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-oqgraph-engine-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-pam-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-server-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-server-galera-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-server-utils-10.5.29-4.oe2403sp3.x86_64.rpm","mariadb-test-10.5.29-4.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2396"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3494"}],"database_specific":{"severity":"Medium"}}
