{"id":"CVE-2020-14812","details":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","aliases":["BIT-mariadb-2020-14812","BIT-mariadb-min-2020-14812","BIT-mysql-client-2020-14812"],"modified":"2026-05-08T17:47:23.978816Z","published":"2020-10-21T15:15:20.780Z","related":["ALSA-2020:5500","ALSA-2021:3590","CGA-7p3q-crxm-qh8j","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2020:3497-1","SUSE-SU-2020:3500-1","SUSE-SU-2020:3564-1","SUSE-SU-2020:3625-1","openSUSE-SU-2020:2090-1","openSUSE-SU-2020:2149-1","openSUSE-SU-2020:2254-1","openSUSE-SU-2024:11038-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","extracted_events":[{"introduced":"9.5"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","extracted_events":[{"introduced":"7.3"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"31"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"32"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"33"}]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202105-27"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20201023-0003/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"e55bb16b04c6d10f1544feda6800706df6438226"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"6d3792a9a2e30201ffbdc977e370e96825b24f3b"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"d5ce7824444b7491f420061076ae5087d4829428"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"1f18e0c70e3602710c6cb3bef05e7a3ab80573d1"},{"introduced":"7c7f9bef28aa566557da31402142f6dd8298ddd2"},{"fixed":"90f43d260e407c650aa8a7885d674c717618cc37"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"10.1.0"},{"fixed":"10.1.48"},{"introduced":"10.2.0"},{"fixed":"10.2.35"},{"introduced":"10.3.0"},{"fixed":"10.3.26"},{"introduced":"10.4.0"},{"fixed":"10.4.16"},{"introduced":"10.5.0"},{"fixed":"10.5.7"}]}}],"versions":["mariadb-10.1.0","mariadb-10.1.10","mariadb-10.1.11","mariadb-10.1.12","mariadb-10.1.13","mariadb-10.1.14","mariadb-10.1.15","mariadb-10.1.16","mariadb-10.1.17","mariadb-10.1.18","mariadb-10.1.19","mariadb-10.1.2","mariadb-10.1.20","mariadb-10.1.21","mariadb-10.1.22","mariadb-10.1.23","mariadb-10.1.24","mariadb-10.1.25","mariadb-10.1.26","mariadb-10.1.27","mariadb-10.1.28","mariadb-10.1.29","mariadb-10.1.3","mariadb-10.1.30","mariadb-10.1.31","mariadb-10.1.32","mariadb-10.1.33","mariadb-10.1.34","mariadb-10.1.35","mariadb-10.1.37","mariadb-10.1.38","mariadb-10.1.39","mariadb-10.1.4","mariadb-10.1.41","mariadb-10.1.42","mariadb-10.1.43","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.1.9","mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.2","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.22","mariadb-10.2.23","mariadb-10.2.24","mariadb-10.2.25","mariadb-10.2.26","mariadb-10.2.27","mariadb-10.2.28","mariadb-10.2.29","mariadb-10.2.30","mariadb-10.2.31","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.10","mariadb-10.3.12","mariadb-10.3.16","mariadb-10.3.17","mariadb-10.3.18","mariadb-10.3.19","mariadb-10.3.2","mariadb-10.3.20","mariadb-10.3.21","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.3.7","mariadb-10.4.10","mariadb-10.4.11","mariadb-10.4.3","mariadb-10.4.4","mariadb-10.4.5","mariadb-10.4.7","mariadb-10.4.9","mariadb-10.5.0","mariadb-10.5.2","mariadb-10.5.4"],"database_specific":{"vanir_signatures_modified":"2026-05-08T17:47:23Z","vanir_signatures":[{"id":"CVE-2020-14812-35beb49c","target":{"file":"storage/innobase/buf/buf0rea.cc","function":"buf_read_ahead_random"},"signature_version":"v1","signature_type":"Function","deprecated":false,"digest":{"length":1703,"function_hash":"139143476138614112663389233342431924674"},"source":"https://github.com/mariadb/server/commit/90f43d260e407c650aa8a7885d674c717618cc37"},{"id":"CVE-2020-14812-39f20dc1","target":{"file":"storage/innobase/buf/buf0rea.cc"},"signature_version":"v1","signature_type":"Line","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["209286758564299416669712706539792081897","184427145676706799271968024451543459266","189431539836803129291652246390974801250","337679024572281120129856860082269354154"]},"source":"https://github.com/mariadb/server/commit/90f43d260e407c650aa8a7885d674c717618cc37"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14812.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"033e35de2da52984b592e84feba8243afc71785c"},{"last_affected":"e18e2390b3f84a97f9d6cf53aff7d51b736faa4e"},{"last_affected":"527c12ed611f3fe072c3043734319edb2c733099"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"f8cdce86448a211511e8a039c62580ae16cb96f5"}],"database_specific":{"source":"CPE_FIELD","cpe":["cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"5.6.0"},{"last_affected":"5.6.49"},{"introduced":"5.7.0"},{"last_affected":"5.7.31"},{"introduced":"0"},{"last_affected":"9.0"},{"introduced":"8.0.0"},{"last_affected":"8.0.21"}]}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.6.40","mysql-5.6.45","mysql-5.6.47","mysql-5.6.48","mysql-5.6.49","mysql-5.7.31","mysql-8.0.21","mysql-9.0.0","mysql-9.0.0-release","mysql-cluster-8.0.21","mysql-cluster-9.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14812.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}