# What's New in MariaDB Enterprise Server 10.6?

{% hint style="info" %}

<p align="center">The most recent release of MariaDB Enterprise Server 10.6 is:</p>

<h4 align="center"><a href="10.6.25-21"><strong>MariaDB Enterprise Server 10.6.25-21</strong></a> <a href="https://mariadb.com/downloads/enterprise/enterprise-server/" class="button primary">Download Now</a></h4>
{% endhint %}

MariaDB Enterprise Server 10.6 introduces the new features listed below.

## Atomic DDL

DDL (Data Definition Language) statements are now atomic operations. If the DDL statement is not fully successful, the operation will be rolled back. When the server crashes or is killed in the middle of a DDL statement, the operation is rolled back during crash recovery when the server is restarted.

During crash recovery, the server uses the DDL log to determine if an operation needs to be rolled back. When the [binary log](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/data-types/string-data-types/binary) is enabled, the crash recovery process ensures that the successful operations are written to the binary log and that the unsuccessful operations are not.

By default, the DDL log is at `ddl-recovery.log` in the [datadir](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/server-management/variables-and-modes/server-system-variables#datadir). When DDL statements are being executed, the DDL log is synchronized to disk very frequently. If you want to configure a custom path for the DDL log, the [log-ddl-recovery](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/server-management/starting-and-stopping-mariadb/mariadbd-options) option can be used.

As of this release, the following storage engines fully support atomic DDL:

* [Aria](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/storage-engines/aria)
* [InnoDB](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/storage-engines/innodb)
* [MyISAM](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/storage-engines/myisam-storage-engine)
* [MyRocks](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/storage-engines/myrocks)

## SKIP LOCKED

[SELECT \[ FOR UPDATE | LOCK IN SHARED MODE \] .. SKIP LOCKED](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-statements/data-manipulation/selecting-data/select) ignores already-locked rows.

One use case for this feature is within applications that sell a limited resource, such as ticketing, rentals, or seat-based sales. In these applications, you need a way to display only the available inventory. This can be accomplished by querying available inventory and skipping locked rows.

```sql
SELECT *
FROM ticketing
WHERE claimed = 0 AND section = 'B'
ORDER BY row DESC
LIMIT 10
FOR UPDATE SKIP LOCKED;
```

## Enterprise Audit Object Filters

[MariaDB Enterprise Audit](https://mariadb.com/resources/blog/mariadb-enterprise-audit-the-new-plugin) allows database-specific and table-specific filters.

For example:

```json
{
  "connect_event" : "ALL",
  "table_event" : ["READ","WRITE",{"ignore_tables" : "mysql.*"}],
  "query_event" : ["DDL",{"tables" : "test.t2"}]
}
```

## JSON\_TABLE

[JSON\_TABLE()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/special-functions/json-functions/json_table) returns a table from JSON data.

Queryable rows and columns are produced based on the JSON input, but are not stored in a table on disk. Column mappings are defined in a JSON path expression.

Prior to this release, the [JSON\_VALUE()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/special-functions/json-functions/json_value) and [JSON\_QUERY()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/special-functions/json-functions/json_query) functions could be used to retrieve values from JSON data on a per-column basis.

With `JSON_TABLE()`:

* JSON data can `JOIN` with existing tables.
* A table can be created from JSON data using [CREATE TABLE .. AS SELECT](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/server-usage/tables/create-table) against a `JSON_TABLE()`.
* [NESTED PATH](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/special-functions/json-functions/json_table) enables extraction of nested data from JSON arrays and objects.

## Sys Schema

sys schema provides a set of views, functions, and stored procedures to aid DBA analysis of the [Performance Schema](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/system-tables/performance-schema).

## OFFSET Syntax

Additional syntax is supported for [SELECT .. OFFSET](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-statements/data-manipulation/selecting-data/select)

`OFFSET start { ROW | ROWS } FETCH { FIRST | NEXT } [ count ] { ROW | ROWS } { ONLY | WITH TIES }` is an alternative to `LIMIT .. OFFSET`

The `WITH TIES` option requires the use of `ORDER BY` and allows the number of rows to exceed the `FETCH` count to ensure that the final row in the chunk includes any additional rows that have the same values in the `ORDER BY` fields (eliminating the need to fetch the next chunk to check for spill-over).

* For example, the following query can return more than 10 rows if there are more `username` rows that match the `username` in the 10th row (the order of the `purchase` values within the complete set of each username's records is non-deterministic):

```sql
SELECT username, purchase
FROM user_purchases
ORDER BY username
OFFSET 305 ROWS
FETCH NEXT 10 ROW WITH TIES;
```

* For example, the following query specifies `ONLY` instead of `WITH TIES`, so the query can't return more than 10 rows:

```sql
SELECT username, purchase
FROM user_purchases
ORDER BY username, purchase
OFFSET 0 ROWS
FETCH NEXT 10 ROWS ONLY;
```

## Enhanced Consistency for Semi-sync Replication

When [rpl\_semi\_sync\_slave\_enabled=ON](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/ha-and-performance/standard-replication/semisynchronous-replication#rpl_semi_sync_slave_enabled), consistency is guaranteed for a Primary server in an HA (Primary/Replica) topology when using semi-synchronous replication.

Prior to this release, when using semi-synchronous replication, if a Primary crashed before sending a transaction to the Replica, on restart the Primary could recover incomplete InnoDB transactions when rejoining as a Replica.

With this release, when using semi-synchronous replication and with `rpl_semi_sync_slave_enabled=ON`, incomplete transactions will be rolled-back on the Replica, ensuring the new Primary (former Replica) and new Replica (former Primary) remain in sync.

## Enhanced Compatibility with Oracle

Expanded compatibility with Oracle through new functions:

* Added function [ADD\_MONTHS()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/date-time-functions/add_months)
* Added function [ROWNUM()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/secondary-functions/information-functions/rownum)
* Added function [SYS\_GUID()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/secondary-functions/miscellaneous-functions/sys_guid)
* Added function [TO\_CHAR()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/string-functions/to_char)

Expanded compatibility with Oracle through [sql\_mode=ORACLE](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/server-management/variables-and-modes/sql_mode) enhancements:

* With `sql_mode=ORACLE` added `MINUS` as an alias to `EXCEPT`
* With `sql_mode=ORACLE` improved `SYSDATE` to allow use without parenthesis.
* With `sql_mode=ORACLE` supports a [rownum](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/secondary-functions/information-functions/rownum) pseudo-column name as an alias for the [ROWNUM()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/secondary-functions/information-functions/rownum) function.
* With `sql_mode=ORACLE` subqueries in a `FROM` clause do not require the AS clause.

## Enhanced Compatibility with Sybase SQL Anywhere

Enhanced compatibility with Sybase SQL Anywhere through \[sql\_mode=EXTENDED\_ALIASES]

* With `sql_mode=EXTENDED_ALIASES`, alias resolution and use of column aliases in the SQL [SELECT](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-statements/data-manipulation/selecting-data/select) list and `WHERE` clause.
* With `sql_mode=EXTENDED_ALIASES`, support use of an alias in the [SELECT](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-statements/data-manipulation/selecting-data/select) list before the alias is defined.
* With `sql_mode=EXTENDED_ALIASES`, if the same label is used for an alias and a column, the alias is used.

## Backported Features

[MariaDB Enterprise Server 10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)

* The `UUID` data type has been backported from MariaDB Community Server 10.7 for more efficient storage of `UUID` values. ([MENT-1459](https://jira.mariadb.org/browse/MENT-1459))

[MariaDB Enterprise Server 10.6.11-6](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.11-6)

* The new [slave\_max\_statement\_time system variable](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/ha-and-performance/standard-replication/replication-and-binary-log-system-variables) is available to set the maximum execution time for queries on replica nodes. ([MENT-1566](https://jira.mariadb.org/browse/MENT-1566), [MDEV-27161](https://jira.mariadb.org/browse/MDEV-27161))
  * When a query takes more than `slave_max_statement_time` seconds to run on the replica (slave) node, the query is aborted, and replication stops with an error.
  * The system variable can be set to a decimal value, where the decimal component has microsecond precision.
  * When set to `0`, there is no timeout.
  * The default value is `0`.
* To simplify maintenance, the [ALTER TABLE](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-statements/data-definition/alter/alter-table) statement supports new clauses to convert tables to partitions and partitions to tables. ([MENT-1454](https://jira.mariadb.org/browse/MENT-1454))
  * To convert a partition to a table, use the `CONVERT PARTITION .. TO TABLE ..` clause:

```sql
ALTER TABLE partitioned_table
 CONVERT PARTITION part1
 TO TABLE normal_table;
```

* To convert a table to a partition, use the `CONVERT TABLE .. TO PARTITION ..` clause:

```sql
ALTER TABLE partitioned_table
 CONVERT TABLE normal_table
 TO PARTITION part1 VALUES LESS THAN (12345);
```

* The new `CONVERT PARTITION` and `CONVERT TABLE` clauses are crash-safe operations.
* The `EXCHANGE PARTITION` clause can still be used, but it is not a crash-safe operation.

[MariaDB Enterprise Server 10.6.12-7](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.12-7)

* In previous releases, the number of undo logs was configurable before InnoDB was initialized. With this release, the number of undo logs can also be configured after install.
  * The number of undo logs is configured by the InnoDB system variable `--innodb-undo-tablespaces`.
  * Splitting undo logs over multiple tablespaces can reduce the size of a single tablespace, especially the InnoDB system tablespace.
  * In previous releases, the number of undo logs had to be configured before InnoDB was initialized, so changing the number of undo logs would require setting up a new server instance. With this backport from MariaDB Community Server 10.11, the number of undo logs can be changed so it will take effect with the next server start. (MENT-1650)

[MariaDB Enterprise Server 10.6.15-10](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.15-10)

* [JSON\_OVERLAPS()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/special-functions/json-functions/json_overlaps) has been backported. ([MENT-1853](https://jira.mariadb.org/browse/MENT-1853))
  * The `JSON_OVERLAPS()` function can be used to compare two JSON documents to determine if they have any key-value pairs or array elements in common.

```sql
SELECT JSON_OVERLAPS('{"A": 1, "B": {"C":2}}', '{"A": 2, "B": {"C":2}}') AS is_overlap;
```

```
+---------------------+
| is_overlap          |
+---------------------+
| 1                   |
+---------------------+
```

* [JSON\_SCHEMA\_VALID()](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/reference/sql-functions/special-functions/json-functions/json_schema_valid) has been backported. ([MENT-1796](https://jira.mariadb.org/browse/MENT-1796))
  * The `JSON_SCHEMA_VALID()` function can be used to validate a JSON document against a JSON schema, as documented by the [JSON Schema Draft 2020.](https://json-schema.org/draft/2020-12/release-notes)
  * This function can also be used in a `CHECK` constraint to verify that JSON documents are only stored in the database if they include required items and that the values are within a given range and length.

[MariaDB Enterprise Server 10.6.16-11](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.16-11)

* A new view `sys.privileges_by_table_by_level` in the sys schema, to show privileges granted to a table on a global, schema, or table level ([MENT-2007](https://jira.mariadb.org/browse/MENT-2007))
* Option s3\_debug can now be changed without the need to restart the server ([MENT-2001](https://jira.mariadb.org/browse/MENT-2001))
* New Time Zone Options `%Z` and `%z` for DATE\_FORMAT ([MENT-1902](https://jira.mariadb.org/browse/MENT-1902))
* Server Audit Log with Milliseconds Precision Timestamps ([MENT-1744](https://jira.mariadb.org/browse/MENT-1744))

[MariaDB Enterprise Server 10.6.24-20](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.24-20)

* Two new fields are available via `SHOW REPLICA STATUS` ([MENT-2129](https://jira.mariadb.org/browse/MENT-2129))
  1. `Connects_Tried`, which provides the number of attempts the replica has made to connect to the primary, and
  2. `Master_Retry_Count`, which provides the number of times the replica will attempt to connect to a primary before giving up.
* Add the server option `--replicate-rewrite-db` to system variables and SHOW REPLICA STATUS (backport of MDEV-15530) ([MENT-2421](https://jira.mariadb.org/browse/MENT-2421))
* The authentication plugin `caching_sha2_password` has been added, not loaded by default ([MDEV-37600](https://jira.mariadb.org/browse/MDEV-37600))

## Security Vulnerabilities (CVE) Fixed in MariaDB Enterprise Server 10.6

For a complete list of security vulnerabilities (CVE) fixed across all versions of MariaDB Enterprise Server, see the [Security Vulnerabilities Fixed in MariaDB Enterprise Server](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/security/cve/enterprise-server) page.

| CVE ID (with cve.org link)                                        | CVSS base score                     | Enterprise Server 10.6 Release                                                         |
| ----------------------------------------------------------------- | ----------------------------------- | -------------------------------------------------------------------------------------- |
| [CVE-2026-21968](https://www.cve.org/CVERecord?id=CVE-2026-21968) | 6.5                                 | [10.6.24-20](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.24-20) |
| [CVE-2025-30693](https://www.cve.org/CVERecord?id=CVE-2025-30693) | 5.5                                 | [10.6.22-18](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.22-18) |
| [CVE-2023-52969](https://www.cve.org/CVERecord?id=CVE-2023-52969) | 4.9                                 | [10.6.22-18](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.22-18) |
| [CVE-2023-52970](https://www.cve.org/CVERecord?id=CVE-2023-52970) | 4.9                                 | [10.6.22-18](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.22-18) |
| [CVE-2025-21490](https://www.cve.org/CVERecord?id=CVE-2025-21490) | 4.9                                 | [10.6.21-17](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.21-17) |
| [CVE-2024-21096](https://www.cve.org/CVERecord?id=CVE-2024-21096) | 4.9                                 | [10.6.18-14](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.18-14) |
| [CVE-2023-22084](https://www.cve.org/CVERecord?id=CVE-2023-22084) | 4.9                                 | [10.6.16-11](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.16-11) |
| [CVE-2022-47015](https://www.cve.org/CVERecord?id=CVE-2022-47015) | N/A (Medium) [<sup>#1</sup>](#id-1) | [10.6.12-8](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.12-8)   |
| [CVE-2023-5157](https://www.cve.org/CVERecord?id=CVE-2023-5157)   | 7.5                                 | [10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)     |
| [CVE-2018-25032](https://www.cve.org/CVERecord?id=CVE-2018-25032) | 7.5                                 | [10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)     |
| [CVE-2022-32091](https://www.cve.org/CVERecord?id=CVE-2022-32091) | 6.5                                 | [10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)     |
| [CVE-2022-32089](https://www.cve.org/CVERecord?id=CVE-2022-32089) | 6.5                                 | [10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)     |
| [CVE-2022-32084](https://www.cve.org/CVERecord?id=CVE-2022-32084) | 6.5                                 | [10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)     |
| [CVE-2022-32082](https://www.cve.org/CVERecord?id=CVE-2022-32082) | 6.5                                 | [10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)     |
| [CVE-2022-32081](https://www.cve.org/CVERecord?id=CVE-2022-32081) | 6.5                                 | [10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)     |
| [CVE-2022-27458](https://www.cve.org/CVERecord?id=CVE-2022-27458) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27457](https://www.cve.org/CVERecord?id=CVE-2022-27457) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27456](https://www.cve.org/CVERecord?id=CVE-2022-27456) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27455](https://www.cve.org/CVERecord?id=CVE-2022-27455) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27452](https://www.cve.org/CVERecord?id=CVE-2022-27452) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27451](https://www.cve.org/CVERecord?id=CVE-2022-27451) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27449](https://www.cve.org/CVERecord?id=CVE-2022-27449) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27448](https://www.cve.org/CVERecord?id=CVE-2022-27448) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27447](https://www.cve.org/CVERecord?id=CVE-2022-27447) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27446](https://www.cve.org/CVERecord?id=CVE-2022-27446) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27445](https://www.cve.org/CVERecord?id=CVE-2022-27445) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27444](https://www.cve.org/CVERecord?id=CVE-2022-27444) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27387](https://www.cve.org/CVERecord?id=CVE-2022-27387) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27386](https://www.cve.org/CVERecord?id=CVE-2022-27386) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27384](https://www.cve.org/CVERecord?id=CVE-2022-27384) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27383](https://www.cve.org/CVERecord?id=CVE-2022-27383) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27382](https://www.cve.org/CVERecord?id=CVE-2022-27382) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27381](https://www.cve.org/CVERecord?id=CVE-2022-27381) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27380](https://www.cve.org/CVERecord?id=CVE-2022-27380) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27379](https://www.cve.org/CVERecord?id=CVE-2022-27379) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27378](https://www.cve.org/CVERecord?id=CVE-2022-27378) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27377](https://www.cve.org/CVERecord?id=CVE-2022-27377) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-27376](https://www.cve.org/CVERecord?id=CVE-2022-27376) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-21451](https://www.cve.org/CVERecord?id=CVE-2022-21451) | 7.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-32088](https://www.cve.org/CVERecord?id=CVE-2022-32088) | 6.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-32087](https://www.cve.org/CVERecord?id=CVE-2022-32087) | 6.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-32086](https://www.cve.org/CVERecord?id=CVE-2022-32086) | 6.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-32085](https://www.cve.org/CVERecord?id=CVE-2022-32085) | 6.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2022-32083](https://www.cve.org/CVERecord?id=CVE-2022-32083) | 6.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2021-46669](https://www.cve.org/CVERecord?id=CVE-2021-46669) | 6.5                                 | [10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)     |
| [CVE-2021-46668](https://www.cve.org/CVERecord?id=CVE-2021-46668) | 5.5                                 | [10.6.7-3](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.7-3)     |
| [CVE-2021-46665](https://www.cve.org/CVERecord?id=CVE-2021-46665) | 5.5                                 | [10.6.7-3](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.7-3)     |
| [CVE-2021-46664](https://www.cve.org/CVERecord?id=CVE-2021-46664) | 5.5                                 | [10.6.7-3](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.7-3)     |
| [CVE-2021-46663](https://www.cve.org/CVERecord?id=CVE-2021-46663) | 5.5                                 | [10.6.7-3](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.7-3)     |
| [CVE-2021-46661](https://www.cve.org/CVERecord?id=CVE-2021-46661) | 5.5                                 | [10.6.7-3](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.7-3)     |
| [CVE-2021-46659](https://www.cve.org/CVERecord?id=CVE-2021-46659) | 5.5                                 | [10.6.7-3](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.7-3)     |
| [CVE-2022-21595](https://www.cve.org/CVERecord?id=CVE-2022-21595) | 4.4                                 | [10.6.7-3](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.7-3)     |
| [CVE-2022-27385](https://www.cve.org/CVERecord?id=CVE-2022-27385) | 7.5                                 | [10.6.5-2](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.5-2)     |
| [CVE-2021-46667](https://www.cve.org/CVERecord?id=CVE-2021-46667) | 7.5                                 | [10.6.5-2](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.5-2)     |
| [CVE-2022-31624](https://www.cve.org/CVERecord?id=CVE-2022-31624) | 6.5                                 | [10.6.5-2](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.5-2)     |
| [CVE-2021-46662](https://www.cve.org/CVERecord?id=CVE-2021-46662) | 5.5                                 | [10.6.5-2](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.5-2)     |
| [CVE-2021-46658](https://www.cve.org/CVERecord?id=CVE-2021-46658) | 5.5                                 | [10.6.4-1](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.4-1)     |

#### #1:

MariaDB CVEs are assigned a word rating instead of a CVSS base score. See the [MariaDB Engineering Policy](https://mariadb.com/engineering-policies/) for details.

## Available Versions

* [MariaDB Enterprise Server 10.6.24-20](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.24-20)
* [MariaDB Enterprise Server 10.6.23-19](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.23-19)
* [MariaDB Enterprise Server 10.6.22-18](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.22-18)
* [MariaDB Enterprise Server 10.6.21-17](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.21-17)
* [MariaDB Enterprise Server 10.6.20-16](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.20-16)
* [MariaDB Enterprise Server 10.6.19-15](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.19-15)
* [MariaDB Enterprise Server 10.6.18-14](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.18-14)
* [MariaDB Enterprise Server 10.6.17-13](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.17-13)
* [MariaDB Enterprise Server 10.6.17-12](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.17-12)
* [MariaDB Enterprise Server 10.6.16-11](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.16-11)
* [MariaDB Enterprise Server 10.6.15-10](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.15-10)
* [MariaDB Enterprise Server 10.6.14-9](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.14-9)
* [MariaDB Enterprise Server 10.6.12-8](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.12-8)
* [MariaDB Enterprise Server 10.6.12-7](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.12-7)
* [MariaDB Enterprise Server 10.6.11-6](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.11-6)
* [MariaDB Enterprise Server 10.6.9-5](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.9-5)
* [MariaDB Enterprise Server 10.6.8-4](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.8-4)
* [MariaDB Enterprise Server 10.6.7-3](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.7-3)
* [MariaDB Enterprise Server 10.6.5-2](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.5-2)
* [MariaDB Enterprise Server 10.6.4-1](https://mariadb.com/docs/release-notes/enterprise-server/10.6/10.6.4-1)

See also: [All MariaDB Enterprise Releases](https://mariadb.com/docs/release-notes/enterprise-server/all-releases)

## Installation Instructions <a href="#installation-instructions" id="installation-instructions"></a>

* [Deploy MariaDB Enterprise with Repositories](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/server-management/install-and-upgrade-mariadb/installing-mariadb/binary-packages/mariadb-package-repository-setup-and-usage)
* [Deploy MariaDB Enterprise with Package Tarballs](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/server-management/install-and-upgrade-mariadb/installing-mariadb/binary-packages/package-tarballs)
* [Deploy MariaDB Enterprise with Docker](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/server-management/automated-mariadb-deployment-and-administration/docker-and-mariadb/deploy-mariadb-enterprise-server-with-docker)

## Upgrade Instructions <a href="#upgrade-instructions" id="upgrade-instructions"></a>

* [Upgrade to MariaDB Enterprise Server 10.6](https://app.gitbook.com/s/SsmexDFPv2xG2OTyO5yV/server-management/install-and-upgrade-mariadb/installing-enterprise-server/upgrade-paths/mariadb-enterprise-server-10.6/upgrade-to-mariadb-enterprise-server-10.6)

<sub>*This page is: Copyright © 2025 MariaDB. All rights reserved.*</sub>

{% @marketo/form formid="4316" formId="4316" %}
