{"id":"CVE-2023-22084","details":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","aliases":["BIT-mariadb-2023-22084","BIT-mariadb-min-2023-22084","BIT-mysql-client-2023-22084"],"modified":"2026-04-11T12:45:42.420935Z","published":"2023-10-17T22:15:13.793Z","related":["ALSA-2024:0894","ALSA-2024:1141","ALSA-2025:0739","ALSA-2025:0914","CGA-44p7-4jw7-2v56","MGASA-2023-0327","MGASA-2023-0337","SUSE-SU-2023:4907-1","SUSE-SU-2023:4908-1","SUSE-SU-2024:1922-1","SUSE-SU-2024:1985-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"37"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"38"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"39"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2023.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00017.html"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OR7GNQAJZ7NMHT4HRDNROR3DS272KKET/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UCGSAQFWYIJRIYLZLHPS3MRUS4AQ5JQH/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZL2AT2ZUKB6K22UTISHEZ4JKG4VZ3VO/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"c4143f909528e3fab0677a28631d10389354c491"},{"introduced":"7c7f9bef28aa566557da31402142f6dd8298ddd2"},{"fixed":"6cfd2ba397b0ca689d8ff1bdb9fc4a4dc516a5eb"},{"introduced":"1a647b700f6b72dc97211510a5d0c647d5d3d911"},{"fixed":"b83c379420a8846ae4b28768d3c81fa354cca056"},{"introduced":"0"},{"fixed":"04d9a46c41b36b61057741abddf7840962e76893"},{"fixed":"fecd78b83785d5ae96f2c6ff340375be803cd299"},{"fixed":"48af85db217a88409e6aac51bf86e3bf525d8f07"},{"fixed":"0f5613a25f27b8034645226a48c2dc1aa4562281"},{"fixed":"929532a9426d085111c24c63de9c23cc54382259"}],"database_specific":{"extracted_events":[{"introduced":"10.4.0"},{"fixed":"10.4.32"},{"introduced":"10.5.0"},{"fixed":"10.5.23"},{"introduced":"10.6.0"},{"fixed":"10.6.16"},{"introduced":"10.10.0"},{"fixed":"10.10.7"},{"introduced":"10.11.0"},{"fixed":"10.11.6"},{"introduced":"11.0.0"},{"fixed":"11.0.4"},{"introduced":"11.1.0"},{"fixed":"11.1.3"},{"introduced":"11.2.0"},{"fixed":"11.2.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"}}],"versions":["mariadb-10.1.0","mariadb-10.1.2","mariadb-10.1.3","mariadb-10.1.4","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.10.1","mariadb-10.10.2","mariadb-10.10.2-release","mariadb-10.10.3","mariadb-10.10.4","mariadb-10.11.1","mariadb-10.11.2","mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.2","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.2","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.4.10","mariadb-10.4.11","mariadb-10.4.20","mariadb-10.4.21","mariadb-10.4.22","mariadb-10.4.23","mariadb-10.4.25","mariadb-10.4.26","mariadb-10.4.27","mariadb-10.4.28","mariadb-10.4.29","mariadb-10.4.3","mariadb-10.4.30","mariadb-10.4.4","mariadb-10.4.5","mariadb-10.4.7","mariadb-10.4.9","mariadb-10.5.0","mariadb-10.5.11","mariadb-10.5.12","mariadb-10.5.13","mariadb-10.5.14","mariadb-10.5.16","mariadb-10.5.17","mariadb-10.5.18","mariadb-10.5.2","mariadb-10.5.4","mariadb-10.6.0","mariadb-10.6.1","mariadb-10.6.10","mariadb-10.6.11","mariadb-10.6.12","mariadb-10.6.13","mariadb-10.6.14","mariadb-10.6.2","mariadb-10.6.3","mariadb-10.6.4","mariadb-10.6.5","mariadb-10.6.6","mariadb-10.6.8","mariadb-10.6.9","mariadb-11.0.1","mariadb-11.1.2","mariadb-11.2.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22084.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"1c8608701b633cefa76fcb4ad985359f054e5290"},{"last_affected":"ea1efa9822d81044b726aab20c857d5e1b7e046a"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"057f5c9509c6c9ea3ce3acdc619f3353c09e6ec6"}],"database_specific":{"extracted_events":[{"introduced":"5.7.0"},{"last_affected":"5.7.43"},{"introduced":"0"},{"last_affected":"8.1.0"},{"introduced":"8.0"},{"last_affected":"8.0.34"}],"source":"CPE_FIELD","cpe":["cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*"]}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.7.31","mysql-5.7.32","mysql-5.7.35","mysql-5.7.36","mysql-5.7.37","mysql-5.7.38","mysql-5.7.39","mysql-5.7.40","mysql-5.7.40-testing","mysql-5.7.43","mysql-8.0.34","mysql-8.1.0","mysql-cluster-8.0.34","mysql-cluster-8.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22084.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}