{"id":"CVE-2022-21427","details":"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","aliases":["BIT-mariadb-2022-21427","BIT-mariadb-min-2022-21427","BIT-mysql-client-2022-21427"],"modified":"2026-02-19T01:56:50.042685Z","published":"2022-04-19T21:15:15.210Z","related":["ALSA-2022:6443","ALSA-2022:6590","ALSA-2022:7119","CGA-hf5p-67qg-chrc","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2022:2003-1","SUSE-SU-2022:2107-1","SUSE-SU-2022:2160-1","SUSE-SU-2022:2189-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"a0d4f0f306c6e478a1f45727e8fd9c867f9672d9"},{"introduced":"7c7f9bef28aa566557da31402142f6dd8298ddd2"},{"fixed":"90f43d260e407c650aa8a7885d674c717618cc37"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"0ba528fe56f6c637d9fbc9d177a62610038fd519"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"23ddc3518f999e003d54f7a069b63b73585588aa"}]}],"versions":["mariadb-10.0.31","mariadb-10.0.32","mariadb-10.0.33","mariadb-10.0.34","mariadb-10.0.35","mariadb-10.0.36","mariadb-10.0.37","mariadb-10.0.38","mariadb-10.1.23","mariadb-10.1.24","mariadb-10.1.25","mariadb-10.1.26","mariadb-10.1.27","mariadb-10.1.28","mariadb-10.1.29","mariadb-10.1.30","mariadb-10.1.31","mariadb-10.1.32","mariadb-10.1.33","mariadb-10.1.34","mariadb-10.1.35","mariadb-10.1.36","mariadb-10.1.37","mariadb-10.1.38","mariadb-10.1.39","mariadb-10.1.40","mariadb-10.1.41","mariadb-10.1.42","mariadb-10.1.43","mariadb-10.1.44","mariadb-10.1.45","mariadb-10.1.46","mariadb-10.1.47","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.17","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.22","mariadb-10.2.23","mariadb-10.2.24","mariadb-10.2.25","mariadb-10.2.26","mariadb-10.2.27","mariadb-10.2.28","mariadb-10.2.29","mariadb-10.2.30","mariadb-10.2.31","mariadb-10.2.32","mariadb-10.2.33","mariadb-10.2.34","mariadb-10.2.35","mariadb-10.2.36","mariadb-10.2.37","mariadb-10.2.38","mariadb-10.2.39","mariadb-10.2.40","mariadb-10.2.41","mariadb-10.2.42","mariadb-10.2.43","mariadb-10.2.6","mariadb-10.2.7","mariadb-10.2.8","mariadb-10.2.9","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.10","mariadb-10.3.11","mariadb-10.3.12","mariadb-10.3.13","mariadb-10.3.14","mariadb-10.3.15","mariadb-10.3.16","mariadb-10.3.17","mariadb-10.3.18","mariadb-10.3.19","mariadb-10.3.2","mariadb-10.3.20","mariadb-10.3.21","mariadb-10.3.22","mariadb-10.3.23","mariadb-10.3.24","mariadb-10.3.25","mariadb-10.3.26","mariadb-10.3.27","mariadb-10.3.28","mariadb-10.3.29","mariadb-10.3.3","mariadb-10.3.30","mariadb-10.3.31","mariadb-10.3.32","mariadb-10.3.33","mariadb-10.3.34","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.3.7","mariadb-10.3.8","mariadb-10.3.9","mariadb-5.5.55","mariadb-5.5.56","mariadb-5.5.57","mariadb-5.5.58","mariadb-5.5.59","mariadb-5.5.60","mariadb-5.5.61","mariadb-5.5.62","mariadb-5.5.63","mariadb-5.5.64","mariadb-5.5.65","mariadb-5.5.66","mariadb-5.5.67","mariadb-5.5.68","mariadb-galera-10.0.30","mariadb-galera-10.0.31","mariadb-galera-10.0.32","mariadb-galera-10.0.33","mariadb-galera-10.0.34","mariadb-galera-10.0.35","mariadb-galera-10.0.36","mariadb-galera-10.0.37","mariadb-galera-5.5.52","mariadb-galera-5.5.53","mariadb-galera-5.5.54","mariadb-galera-5.5.55","mariadb-galera-5.5.56","mariadb-galera-5.5.57","mariadb-galera-5.5.58","mariadb-galera-5.5.59","mariadb-galera-5.5.60","mariadb-galera-5.5.61","mariadb-galera-5.5.62","mysql-5.5.55","mysql-5.5.56","mysql-5.5.57","mysql-5.5.58","mysql-5.5.59","mysql-5.5.60","mysql-5.5.61","mysql-5.5.62"],"database_specific":{"vanir_signatures":[{"signature_type":"Function","signature_version":"v1","id":"CVE-2022-21427-261ea06f","digest":{"length":3842,"function_hash":"139410885805228531428960716111714496814"},"deprecated":false,"target":{"function":"st_select_lex::add_table_to_list","file":"sql/sql_parse.cc"},"source":"https://github.com/mariadb/server/commit/0ba528fe56f6c637d9fbc9d177a62610038fd519"},{"signature_type":"Function","signature_version":"v1","id":"CVE-2022-21427-35beb49c","digest":{"length":1703,"function_hash":"139143476138614112663389233342431924674"},"deprecated":false,"target":{"function":"buf_read_ahead_random","file":"storage/innobase/buf/buf0rea.cc"},"source":"https://github.com/mariadb/server/commit/90f43d260e407c650aa8a7885d674c717618cc37"},{"signature_type":"Line","signature_version":"v1","id":"CVE-2022-21427-39f20dc1","digest":{"threshold":0.9,"line_hashes":["209286758564299416669712706539792081897","184427145676706799271968024451543459266","189431539836803129291652246390974801250","337679024572281120129856860082269354154"]},"deprecated":false,"target":{"file":"storage/innobase/buf/buf0rea.cc"},"source":"https://github.com/mariadb/server/commit/90f43d260e407c650aa8a7885d674c717618cc37"},{"signature_type":"Line","signature_version":"v1","id":"CVE-2022-21427-7971ffe8","digest":{"threshold":0.9,"line_hashes":["109653293203522022930865857668421870622","29073102755632696090890904852202915678","319062535768988456620840697081414713359","80418953152597147384415640027788794032"]},"deprecated":false,"target":{"file":"sql/sql_parse.cc"},"source":"https://github.com/mariadb/server/commit/0ba528fe56f6c637d9fbc9d177a62610038fd519"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-21427.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}