One of the most popular DB servers - made by the developers of MySQL!

MariaDB

Join our mailing list

Stay up to date with latest software releases, news, software discounts, deals and more.

Subscribe

MariaDB 10.2.24 (32-bit)

  -  45.2 MB  -  Open Source
  • Latest Version

    MariaDB 11.2.2

  • Operating System

    Windows XP / Vista / Windows 7 / Windows 8 / Windows 10

  • User Rating

    Click to vote
  • Author / Product

    MariaDB Foundation / External Link

  • Filename

    mariadb-10.2.24-win32.msi

  • MD5 Checksum

    76af97be5b6397083e5e0e852901ee23

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system. Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of MariaDB 10.2.24 (32-bit).


For those interested in downloading the most recent release of MariaDB or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • MariaDB 10.2.24 (32-bit) Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    MariaDB 10.2.24 (32-bit) Screenshot 1
  • MariaDB 10.2.24 (32-bit) Screenshot 2
  • MariaDB 10.2.24 (32-bit) Screenshot 3

What's new in this version:

General server
- Both (WHERE 0.1) and (WHERE NOT 0.1) return empty set
- Unsafe to log updates on tables referenced by foreign keys with triggers in statement format
- Server crashes in Field::set_warning_truncated_wrong_value
- Crashes server with segfault during role grants
- Unexpected connection abort after certain operations from within stored procedure
- WITH clause does not work with information_schema as default database
- Server crashes in Item_null_result::field_type upon SELECT with CHARSET(date) and ROLLUP
- Server crashes in String::length on queries with functions and ROLLUP
- Prepared statements with st_convexhull hang and eat 100% cpu.
- Assertion item1->type() == Item::FIELD_ITEM && item2->type() == Item::FIELD_ITEM
- GROUP_CONCAT with ORDER BY inside takes a lot of memory while it's executed
- BULK with replace doesn't take the first parameter in account
- RENAMING AND REPLACING MYSQL.USER TABLE CAN LEAD TO A SERVER CRASH
- Server crashes in delete_tree_element / ... / Item_func_group_concat::repack_tree
- Server Crash When Using a Trigger With A Number of Virtual Columns on INSERT/UPDATE
- Server crash in alloc_histograms_for_table_share upon query from information schema

InnoDB
- Merge InnoDB changes from MySQL 5.6.44 and 5.7.26
- InnoDB persistent corruption fixes: MDEV-19426, MDEV-19022, MDEV-19241, MDEV-13942
- InnoDB recovery fixes and speedup: MDEV-18733, MDEV-12699, MDEV-19356, MDEV-19426

Encryption
- innodb_encrypt_tables will work even with innodb_encryption_rotate_key_age=0

Protocol
- BULK with replace doesn't take the first parameter in account

Replication
- Slave crashes in show_status_array upon running a trigger with select from I_S

Mariabackup
- mariabackup continues, despite failing to open a tablespace

Packaging & Misc
- mysql_upgrade_service now allows MySQL 5.7 to MariaDB 10.2 upgrade
- Starting with this release, we are now providing src.rpm packages for some platforms (MDEV-7066)
- As per the MariaDB Deprecation Policy, this will be the last release of MariaDB 10.2 for Fedora 28

Security
- Add option to PAM authentication plugin to allow case insensitive username matching
- bugfix: multi-update checked privileges on views incorrectly (commit 5057d4637525eadad438d25ee6a4870a4e6b384c)
- during connect, write error log warning for ER_DBACCESS_DENIED_ERROR, if log_warnings > 1
- Malicious SUPER user can possibly change audit log configuration without leaving traces.
- Fixes for the following security vulnerabilities: CVE-2019-2614, CVE-2019-2627 and CVE-2019-2628

Join our mailing list

Stay up to date with latest software releases, news, software discounts, deals and more.

Subscribe