{"id":"CVE-2021-46659","details":"MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.","aliases":["BIT-mariadb-2021-46659","BIT-mariadb-min-2021-46659","BIT-mysql-client-2021-46659"],"modified":"2026-04-09T08:24:52.000974Z","published":"2022-01-29T23:15:07.457Z","related":["ALSA-2022:5826","ALSA-2022:5948","ALSA-2022:6443","MGASA-2022-0070","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2022:0725-1","SUSE-SU-2022:0726-1","SUSE-SU-2022:0731-1","SUSE-SU-2022:0731-2","SUSE-SU-2022:0782-1","SUSE-SU-2022:2561-1","openSUSE-SU-2022:0731-1","openSUSE-SU-2024:11867-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/security/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220311-0003/"},{"type":"EVIDENCE","url":"https://jira.mariadb.org/browse/MDEV-25631"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"e2b50213cf12623da31c8b49be4d40772876223c"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"41a163ac5ccf4ac5394edc84e40b3f47acea6b08"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"c04a203a10e282e1f33fd04d8a1b7ff0b076bce5"},{"introduced":"7c7f9bef28aa566557da31402142f6dd8298ddd2"},{"fixed":"ad3ac55641f18172807b13423353f01377f76e6e"},{"introduced":"1a647b700f6b72dc97211510a5d0c647d5d3d911"},{"fixed":"4ffffd98a5ac89b78954aaa2197b40850ade4191"},{"introduced":"0"},{"fixed":"cb1316b8d213aded32aa2c1a98271eede179146d"}],"database_specific":{"versions":[{"introduced":"5.5.0"},{"fixed":"10.2.42"},{"introduced":"10.3.0"},{"fixed":"10.3.33"},{"introduced":"10.4.0"},{"fixed":"10.4.23"},{"introduced":"10.5.0"},{"fixed":"10.5.14"},{"introduced":"10.6.0"},{"fixed":"10.6.6"},{"introduced":"10.7.0"},{"fixed":"10.7.2"}]}}],"versions":["mariadb-10.1.0","mariadb-10.1.2","mariadb-10.1.3","mariadb-10.1.4","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.2","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.22","mariadb-10.2.23","mariadb-10.2.24","mariadb-10.2.25","mariadb-10.2.26","mariadb-10.2.27","mariadb-10.2.28","mariadb-10.2.29","mariadb-10.2.30","mariadb-10.2.31","mariadb-10.2.39","mariadb-10.2.40","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.10","mariadb-10.3.12","mariadb-10.3.16","mariadb-10.3.17","mariadb-10.3.18","mariadb-10.3.19","mariadb-10.3.2","mariadb-10.3.20","mariadb-10.3.21","mariadb-10.3.26","mariadb-10.3.30","mariadb-10.3.31","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.3.7","mariadb-10.4.10","mariadb-10.4.11","mariadb-10.4.20","mariadb-10.4.21","mariadb-10.4.22","mariadb-10.4.3","mariadb-10.4.4","mariadb-10.4.5","mariadb-10.4.7","mariadb-10.4.9","mariadb-10.5.0","mariadb-10.5.11","mariadb-10.5.12","mariadb-10.5.13","mariadb-10.5.2","mariadb-10.5.4","mariadb-10.6.0","mariadb-10.6.1","mariadb-10.6.2","mariadb-10.6.3","mariadb-10.6.4","mariadb-10.6.5","mariadb-10.7.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-46659.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}