{"id":"CVE-2019-2510","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-04-11T12:20:16.362754Z","published":"2019-01-16T19:30:34.923Z","related":["ALSA-2019:2511","ALSA-2019:3708","CGA-vg49-2pv6-xqwm","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2019:0555-1","SUSE-SU-2019:0609-1","SUSE-SU-2019:1162-1","openSUSE-SU-2019:0327-1","openSUSE-SU-2024:11038-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","extracted_events":[{"introduced":"9.5"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","extracted_events":[{"introduced":"7.3"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"18.04"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"18.10"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.6"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.6"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.6"}],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106627"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1258"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2484"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2511"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3708"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201908-24"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190118-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3867-1/"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"ca325a46d230438ab06b8fe4455f54538dfa11d4"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"c8f9b3f915a729ec35c00e92cc534a01271aa6e6"}],"database_specific":{"cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"10.2.0"},{"fixed":"10.2.22"},{"introduced":"10.3.0"},{"fixed":"10.3.13"}],"source":"CPE_FIELD"}}],"versions":["mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.2","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.10","mariadb-10.3.12","mariadb-10.3.2","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.3.7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-2510.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"d2029238d6d9f648077664e4cdd611e231a6dc14"},{"last_affected":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"ea1efa9822d81044b726aab20c857d5e1b7e046a"},{"last_affected":"87307d4ddd88405117e3f1e51323836d57ab1f57"},{"last_affected":"dc86e412f18b36ce271f791026714e8caa0ec919"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"e4924f36486f971f8a04252e01c803457a2c72f7"}],"database_specific":{"cpe":["cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"5.7.0"},{"last_affected":"5.7.24"},{"introduced":"0"},{"last_affected":"8.0"},{"last_affected":"8.1"},{"last_affected":"8.2"},{"last_affected":"8.4"},{"introduced":"8.0.0"},{"last_affected":"8.0.13"}],"source":"CPE_FIELD"}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.7.24","mysql-8.0.0","mysql-8.0.13","mysql-8.1.0","mysql-8.2.0","mysql-8.4.0","mysql-cluster-8.1.0","mysql-cluster-8.2.0","mysql-cluster-8.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-2510.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}