{"id":"CVE-2016-5629","details":"Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.","modified":"2026-02-24T01:12:59.355826Z","published":"2016-10-25T14:31:44.583Z","related":["MGASA-2016-0371","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2016:2932-1","SUSE-SU-2016:2933-1","openSUSE-SU-2024:10200-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1037050"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2927.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2928.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93668"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037050"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-01"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"0da39caceea7733a94d898427d63ba2670160af4"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"c7e1c89070e34e13cb4a3e947021b91fb211959a"},{"introduced":"b11c4651917bd4472ea8837c64e6d1072a2a19e9"},{"fixed":"6925689ca829901567e9503fd4fdce443f9a7d53"}]}],"database_specific":{"vanir_signatures":[{"signature_version":"v1","signature_type":"Line","digest":{"line_hashes":["10300787521009057356635998495684155765","192111626566387172416930231159549664701","200649067802958136682873101511178304844","139512347727877704466775504772460481116"],"threshold":0.9},"source":"https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53","deprecated":false,"target":{"file":"sql/mysqld.cc"},"id":"CVE-2016-5629-0450532a"},{"signature_version":"v1","signature_type":"Function","digest":{"length":507,"function_hash":"132261035674861403256292598415004597670"},"source":"https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53","deprecated":false,"target":{"file":"sql/wsrep_mysqld.cc","function":"wsrep_init_startup"},"id":"CVE-2016-5629-14e2f95c"},{"signature_version":"v1","signature_type":"Function","digest":{"length":10442,"function_hash":"332731388677987676617497379852326324426"},"source":"https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53","deprecated":false,"target":{"file":"sql/mysqld.cc","function":"init_server_components"},"id":"CVE-2016-5629-ad13bcb6"},{"signature_version":"v1","signature_type":"Line","digest":{"line_hashes":["265637218378701356819371927770861537500","303372550612229990366238246383297477353","175333837506138300354960446020133857034","196718006378468588194234266586605779902"],"threshold":0.9},"source":"https://github.com/mariadb/server/commit/0da39caceea7733a94d898427d63ba2670160af4","deprecated":false,"target":{"file":"sql/field.cc"},"id":"CVE-2016-5629-d1cf04c7"},{"signature_version":"v1","signature_type":"Line","digest":{"line_hashes":["48322688254895416229170939282175586315","246612037741245845170913514545422239772","63643117174896252787942841139351789137","12461612565261460537925623326578810451"],"threshold":0.9},"source":"https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53","deprecated":false,"target":{"file":"sql/wsrep_mysqld.cc"},"id":"CVE-2016-5629-f35317e8"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5629.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"fixed":"754e7eff2872995e2b6e62f9da7448587a411c7b"}]}],"versions":["mysql-5.0.87sp1","mysql-5.0.90","mysql-5.0.91","mysql-5.0.92","mysql-5.0.93","mysql-5.0.94","mysql-5.0.95","mysql-5.0.96","mysql-5.1.40sp1","mysql-5.1.41","mysql-5.1.42","mysql-5.1.43","mysql-5.1.43sp1","mysql-5.1.44","mysql-5.1.45","mysql-5.1.46","mysql-5.1.46sp1","mysql-5.1.47","mysql-5.1.48","mysql-5.1.49","mysql-5.1.49sp1","mysql-5.1.50","mysql-5.1.51","mysql-5.1.52","mysql-5.1.52sp1","mysql-5.1.53","mysql-5.1.54","mysql-5.1.55","mysql-5.1.56","mysql-5.1.57","mysql-5.1.58","mysql-5.1.59","mysql-5.1.60","mysql-5.1.61","mysql-5.1.62","mysql-5.1.63","mysql-5.1.65","mysql-5.1.66","mysql-5.1.67","mysql-5.1.68","mysql-5.1.69","mysql-5.1.69-retag","mysql-5.1.70","mysql-5.1.71","mysql-5.1.72","mysql-5.1.73","mysql-5.1.74","mysql-5.1.75","mysql-5.1.76","mysql-5.1.77","mysql-5.5.0","mysql-5.5.1-m2","mysql-5.5.10","mysql-5.5.11","mysql-5.5.12","mysql-5.5.13","mysql-5.5.14","mysql-5.5.15","mysql-5.5.16","mysql-5.5.17","mysql-5.5.18","mysql-5.5.19","mysql-5.5.2-m2","mysql-5.5.20","mysql-5.5.21","mysql-5.5.22","mysql-5.5.23","mysql-5.5.24","mysql-5.5.25","mysql-5.5.25a","mysql-5.5.27","mysql-5.5.28","mysql-5.5.29","mysql-5.5.3-m3","mysql-5.5.30","mysql-5.5.31","mysql-5.5.32","mysql-5.5.33","mysql-5.5.34","mysql-5.5.35","mysql-5.5.36","mysql-5.5.37","mysql-5.5.38","mysql-5.5.39","mysql-5.5.40","mysql-5.5.41","mysql-5.5.42","mysql-5.5.43","mysql-5.5.44","mysql-5.5.45","mysql-5.5.46","mysql-5.5.47","mysql-5.5.48","mysql-5.5.49","mysql-5.5.5-m3","mysql-5.5.50","mysql-5.5.51","mysql-5.5.6-rc","mysql-5.5.7","mysql-5.5.8","mysql-5.5.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5629.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}