{"id":"CVE-2021-2011","details":"Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).","aliases":["BIT-mariadb-2021-2011","BIT-mariadb-min-2021-2011","BIT-mysql-client-2021-2011"],"modified":"2026-05-18T13:49:25.461531Z","published":"2021-01-20T15:15:45.923Z","related":["ALSA-2021:3590","CGA-9q5p-h5xg-5g6r"],"database_specific":{"unresolved_ranges":[{"vendor_product":"fedoraproject:fedora","source":"CPE_FIELD","cpes":["cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"32"},{"last_affected":"33"}]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202105-27"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"e48d775c6f066add457fa8cfb2ebc4d5ff0c7613"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"2e5681a450627709512138a7d15b8ee035a29c6a"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"1025363a35571d5a0ba7023287104d23c7aa61d5"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"bb045e7931c451b228ffc5bcdb1791a31eb0c852"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.5.0"},{"fixed":"5.5.61"},{"introduced":"10.0.0"},{"fixed":"10.0.35"},{"introduced":"10.1.0"},{"fixed":"10.1.33"},{"introduced":"10.2.0"},{"fixed":"10.2.15"}],"cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"}}],"versions":["mariadb-10.2.13","mariadb-10.2.14","mariadb-10.1.32","mariadb-10.1.31","mariadb-10.2.12","mariadb-10.1.30","mariadb-10.2.11","mariadb-10.1.29","mariadb-10.2.10","mariadb-10.1.28","mariadb-10.1.27","mariadb-10.1.26","mariadb-10.1.25","mariadb-10.1.24","mariadb-10.1.23","mariadb-10.2.5","mariadb-10.1.22","mariadb-10.1.21","mariadb-10.1.20","mariadb-10.1.19","mariadb-10.1.18","mariadb-10.2.2","mariadb-10.1.17","mariadb-10.1.16","mariadb-10.2.1","mariadb-10.1.15","mariadb-10.1.14","mariadb-10.2.0","mariadb-10.1.13","mariadb-10.1.12","mariadb-10.1.11","mariadb-10.1.10","mariadb-10.1.9","mariadb-10.1.8","mariadb-10.1.7","mariadb-10.1.6","mariadb-10.1.5","mariadb-10.1.4","mariadb-10.1.3","mariadb-10.1.2","mariadb-10.1.0"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","id":"CVE-2021-2011-054c046b","deprecated":false,"signature_type":"Function","digest":{"length":3281,"function_hash":"88964842003053574630259804416355278302"},"source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","target":{"function":"unpack_fields","file":"sql-common/client.c"}},{"signature_version":"v1","id":"CVE-2021-2011-404642c2","deprecated":false,"signature_type":"Function","digest":{"length":2052,"function_hash":"30804943894516639331708306752096632231"},"source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","target":{"function":"cli_read_rows","file":"sql-common/client.c"}},{"signature_version":"v1","id":"CVE-2021-2011-c0d67519","deprecated":false,"signature_type":"Line","digest":{"line_hashes":["78191142045503767829834019020932019650","250157719937173868004615858289264688140","312170375706132797718465719883724591296","15117071355854376419182426407334479680","140920309514825384561268578794081140775","130933521110411440899075290412605664940","28770826883863233939468445958714821618","49331132400223798885681869446783630656"],"threshold":0.9},"source":"https://github.com/mariadb/server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613","target":{"file":"sql-common/client.c"}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-2011.json","vanir_signatures_modified":"2026-05-18T13:49:25Z"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"2032b65c44e242a7e452a38bf7626dfacc315b9c"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"ee4455a33b10f1b1886044322e4893f587b319ed"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"5.7.0"},{"last_affected":"5.7.32"},{"introduced":"8.0.0"},{"last_affected":"8.0.22"}],"cpe":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"}}],"versions":["mysql-cluster-8.0.22","mysql-8.0.22","mysql-5.7.32","mysql-5.7.31","mysql-5.1.4","mysql-4.0.4","mysql-4.0.2","mysql-3.23.36","mysql-3.23.33","mysql-3.23.32","mysql-3.23.31","mysql-3.23.30-gamma","mysql-3.23.28-gamma","mysql-3.23.22-beta"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-2011.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}