Unrated severityNVD Advisory· Published Oct 17, 2023· Updated Feb 13, 2025
CVE-2023-22084
CVE-2023-22084
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Affected products
56- osv-coords55 versionspkg:apk/chainguard/mysql-8.0pkg:apk/chainguard/mysql-8.0-bitnami-compatpkg:apk/chainguard/mysql-8.0-clientpkg:apk/chainguard/mysql-8.0-devpkg:apk/chainguard/mysql-8.0-iamguarded-compatpkg:apk/chainguard/mysql-8.0-oci-entrypointpkg:apk/chainguard/mysql-8.0-oci-entrypoint-compatpkg:bitnami/mariadbpkg:bitnami/mariadb-minpkg:bitnami/mysql-clientpkg:rpm/almalinux/galerapkg:rpm/almalinux/Judypkg:rpm/almalinux/mariadbpkg:rpm/almalinux/mariadb-backuppkg:rpm/almalinux/mariadb-commonpkg:rpm/almalinux/mariadb-develpkg:rpm/almalinux/mariadb-embeddedpkg:rpm/almalinux/mariadb-embedded-develpkg:rpm/almalinux/mariadb-errmsgpkg:rpm/almalinux/mariadb-gssapi-serverpkg:rpm/almalinux/mariadb-oqgraph-enginepkg:rpm/almalinux/mariadb-pampkg:rpm/almalinux/mariadb-serverpkg:rpm/almalinux/mariadb-server-galerapkg:rpm/almalinux/mariadb-server-utilspkg:rpm/almalinux/mariadb-testpkg:rpm/almalinux/mecabpkg:rpm/almalinux/mecab-develpkg:rpm/almalinux/mecab-ipadicpkg:rpm/almalinux/mecab-ipadic-EUCJPpkg:rpm/almalinux/mysqlpkg:rpm/almalinux/mysql-commonpkg:rpm/almalinux/mysql-develpkg:rpm/almalinux/mysql-errmsgpkg:rpm/almalinux/mysql-libspkg:rpm/almalinux/mysql-serverpkg:rpm/almalinux/mysql-testpkg:rpm/opensuse/mariadb104&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/mariadb&distro=openSUSE%20Leap%2015.5pkg:rpm/suse/mariadb&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP5pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/mariadb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/mariadb&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/mariadb&distro=SUSE%20Manager%20Server%204.3
< 8.0.38-r0+ 54 more
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 10.4.32
- (no CPE)range: < 10.4.32
- (no CPE)range: < 10.4.32
- (no CPE)range: < 26.4.20-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 1.0.5-18.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 3:10.5.27-1.module_el8.10.0+3947+ac422511
- (no CPE)range: < 0.996-2.module_el8.6.0+3340+d764b636
- (no CPE)range: < 0.996-2.module_el8.6.0+3340+d764b636
- (no CPE)range: < 2.7.0.20070801-16.module_el8.6.0+3340+d764b636
- (no CPE)range: < 2.7.0.20070801-16.module_el8.6.0+3340+d764b636
- (no CPE)range: < 8.0.36-1.module_el8.9.0+3735+82bd6c11
- (no CPE)range: < 8.0.36-1.module_el8.9.0+3735+82bd6c11
- (no CPE)range: < 8.0.36-1.module_el8.9.0+3735+82bd6c11
- (no CPE)range: < 8.0.36-1.module_el8.9.0+3735+82bd6c11
- (no CPE)range: < 8.0.36-1.module_el8.9.0+3735+82bd6c11
- (no CPE)range: < 8.0.36-1.module_el8.9.0+3735+82bd6c11
- (no CPE)range: < 8.0.36-1.module_el8.9.0+3735+82bd6c11
- (no CPE)range: < 10.4.33-150100.3.8.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- (no CPE)range: < 10.5.23-150300.3.38.1
- (no CPE)range: < 10.4.32-150200.3.48.1
- (no CPE)range: < 10.5.23-150300.3.38.1
- (no CPE)range: < 10.5.23-150300.3.38.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- (no CPE)range: < 10.4.32-150200.3.48.1
- (no CPE)range: < 10.5.23-150300.3.38.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- (no CPE)range: < 10.4.32-150200.3.48.1
- (no CPE)range: < 10.5.23-150300.3.38.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- (no CPE)range: < 10.6.18-150400.3.33.1
- Oracle Corporation/MySQL Serverv5Range: *
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.oracle.com/security-alerts/cpuoct2023.htmlmitrevendor-advisory
- lists.debian.org/debian-lts-announce/2024/01/msg00017.htmlmitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OR7GNQAJZ7NMHT4HRDNROR3DS272KKET/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UCGSAQFWYIJRIYLZLHPS3MRUS4AQ5JQH/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZL2AT2ZUKB6K22UTISHEZ4JKG4VZ3VO/mitre
- security.netapp.com/advisory/ntap-20231027-0009/mitre
News mentions
0No linked articles in our index yet.