{"id":"CVE-2019-2758","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).","modified":"2026-03-20T11:31:11.393236Z","published":"2019-07-23T23:15:39.633Z","related":["ALSA-2019:2511","ALSA-2019:3708","CGA-j878-j3jf-2r3c","MGASA-2019-0224","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2019:3306-1","SUSE-SU-2019:3369-1","SUSE-SU-2020:0640-1","SUSE-SU-2020:0831-1","openSUSE-SU-2019:2698-1","openSUSE-SU-2024:11038-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/"},{"type":"WEB","url":"https://support.f5.com/csp/article/K14118520?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2484"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2511"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3708"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K14118520"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4070-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4070-3/"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"d6886b95d0d48d80deffa7f2190b8abd5ee8236b"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"4b5a14d0fe3d6945a0a9516261f563dcfd1f2c9c"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"9a78a283f4ee7e8ccc4afb1d8a24c662fa4c634b"}],"database_specific":{"versions":[{"introduced":"10.2.0"},{"fixed":"10.2.26"},{"introduced":"10.3.0"},{"fixed":"10.3.17"},{"introduced":"10.4.0"},{"fixed":"10.4.7"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"8cc757da3d87bf4a1f07dcfb2d3c96fed3806870"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"124c7ab1d6f914637521fd4463a993aa73403513"}],"database_specific":{"versions":[{"introduced":"5.7.0"},{"last_affected":"5.7.26"},{"introduced":"8.0.0"},{"last_affected":"8.0.16"}]}}],"versions":["mariadb-10.0.25","mariadb-10.0.26","mariadb-10.0.27","mariadb-10.0.28","mariadb-10.0.29","mariadb-10.0.30","mariadb-10.0.31","mariadb-10.0.32","mariadb-10.0.33","mariadb-10.0.34","mariadb-10.0.35","mariadb-10.0.36","mariadb-10.0.37","mariadb-10.0.38","mariadb-10.1.14","mariadb-10.1.15","mariadb-10.1.16","mariadb-10.1.17","mariadb-10.1.18","mariadb-10.1.19","mariadb-10.1.20","mariadb-10.1.21","mariadb-10.1.22","mariadb-10.1.23","mariadb-10.1.24","mariadb-10.1.25","mariadb-10.1.26","mariadb-10.1.27","mariadb-10.1.28","mariadb-10.1.29","mariadb-10.1.30","mariadb-10.1.31","mariadb-10.1.32","mariadb-10.1.33","mariadb-10.1.34","mariadb-10.1.35","mariadb-10.1.36","mariadb-10.1.37","mariadb-10.1.38","mariadb-10.1.39","mariadb-10.1.40","mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.17","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.2","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.22","mariadb-10.2.23","mariadb-10.2.24","mariadb-10.2.25","mariadb-10.2.3","mariadb-10.2.4","mariadb-10.2.5","mariadb-10.2.6","mariadb-10.2.7","mariadb-10.2.8","mariadb-10.2.9","mariadb-5.5.49","mariadb-5.5.50","mariadb-5.5.51","mariadb-5.5.52","mariadb-5.5.53","mariadb-5.5.54","mariadb-5.5.55","mariadb-5.5.56","mariadb-5.5.57","mariadb-5.5.58","mariadb-5.5.59","mariadb-5.5.60","mariadb-5.5.61","mariadb-5.5.62","mariadb-5.5.63","mariadb-5.5.64","mariadb-5.5.65","mariadb-galera-10.0.25","mariadb-galera-10.0.26","mariadb-galera-10.0.27","mariadb-galera-10.0.28","mariadb-galera-10.0.29","mariadb-galera-10.0.30","mariadb-galera-10.0.31","mariadb-galera-10.0.32","mariadb-galera-10.0.33","mariadb-galera-10.0.34","mariadb-galera-10.0.35","mariadb-galera-10.0.36","mariadb-galera-10.0.37","mariadb-galera-5.5.49","mariadb-galera-5.5.50","mariadb-galera-5.5.51","mariadb-galera-5.5.52","mariadb-galera-5.5.53","mariadb-galera-5.5.54","mariadb-galera-5.5.55","mariadb-galera-5.5.56","mariadb-galera-5.5.57","mariadb-galera-5.5.58","mariadb-galera-5.5.59","mariadb-galera-5.5.60","mariadb-galera-5.5.61","mariadb-galera-5.5.62","mysql-5.5.49","mysql-5.5.50","mysql-5.5.51","mysql-5.5.52","mysql-5.5.53","mysql-5.5.54","mysql-5.5.55","mysql-5.5.56","mysql-5.5.57","mysql-5.5.58","mysql-5.5.59","mysql-5.5.60","mysql-5.5.61","mysql-5.5.62","mysql-5.5.63","mysql-5.6.33","mysql-5.6.34","mysql-5.6.35","mysql-5.6.36","mysql-5.6.37","mysql-5.6.38","mysql-5.6.39","mysql-5.6.40","mysql-5.6.41","mysql-5.6.42","mysql-5.6.43","mysql-5.7.15","mysql-5.7.16","mysql-5.7.17","mysql-5.7.18","mysql-5.7.19","mysql-5.7.20","mysql-5.7.21","mysql-5.7.22","mysql-5.7.24","mysql-5.7.25","mysql-5.7.26","mysql-8.0.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-2758.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}]}