{"id":"CVE-2024-20972","modified":"2026-05-18T05:56:01.025474791Z","published":"2024-02-17T01:50:20.471Z","related":["ALSA-2024:0894","ALSA-2024:1141"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/20xxx/CVE-2024-20972.json","unresolved_ranges":[{"extracted_events":[{"introduced":"*"},{"last_affected":"8.0.35"},{"introduced":"*"},{"last_affected":"8.2.0"}],"source":"AFFECTED_FIELD"}],"cna_assigner":"oracle"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/20xxx/CVE-2024-20972.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-20972"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2024.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"19feac3674e2ae254b3e7fa7e116fc64ac284d8d"},{"introduced":"0"},{"last_affected":"ea1efa9822d81044b726aab20c857d5e1b7e046a"},{"last_affected":"87307d4ddd88405117e3f1e51323836d57ab1f57"}],"database_specific":{"cpe":["cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql_server:8.1.0:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql_server:8.2.0:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"8.0.0"},{"last_affected":"8.0.35"},{"introduced":"0"},{"last_affected":"8.1.0"},{"last_affected":"8.2.0"}],"source":"CPE_FIELD"}}],"versions":["mysql-cluster-8.2.0","mysql-8.2.0","mysql-cluster-8.0.35","mysql-8.0.35","mysql-cluster-8.1.0","mysql-8.1.0","mysql-5.1.4","mysql-4.0.4","mysql-4.0.2","mysql-3.23.36","mysql-3.23.33","mysql-3.23.32","mysql-3.23.31","mysql-3.23.30-gamma","mysql-3.23.28-gamma","mysql-3.23.22-beta"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-20972.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}