{"id":"CVE-2025-53062","details":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and  9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-04-11T01:48:20.866876Z","published":"2025-10-21T20:20:46.377Z","related":["ALSA-2025:23008","ALSA-2025:23109","ALSA-2025:23111","ALSA-2025:23134","ALSA-2025:23137"],"references":[{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2025.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"fixed":"2d6d5e10436a8f2b58d37af737c2a3e45855d0b7"},{"introduced":"dc86e412f18b36ce271f791026714e8caa0ec919"},{"fixed":"3f821bcb4ee93cd90c0ffa0f8e17bb9677502acf"},{"introduced":"527c12ed611f3fe072c3043734319edb2c733099"},{"fixed":"b79ac1111737174c1b36ab5f63275f0191c000dc"}],"database_specific":{"versions":[{"introduced":"8.0.0"},{"fixed":"8.0.43"},{"introduced":"8.4.0"},{"fixed":"8.4.6"},{"introduced":"9.0.0"},{"fixed":"9.4.0"}]}}],"database_specific":{"vanir_signatures":[{"target":{"file":"storage/innobase/ddl/ddl0builder.cc"},"id":"CVE-2025-53062-49413a0d","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["40519341972351148061927493253565560391","92739509786593219801012166808793403257","179023984236093010935222896814260303731","256122672508829238289839645149202138909"]},"signature_version":"v1","signature_type":"Line","source":"https://github.com/mysql/mysql-server/commit/b79ac1111737174c1b36ab5f63275f0191c000dc"},{"target":{"file":"storage/innobase/ddl/ddl0builder.cc"},"id":"CVE-2025-53062-b64d8b57","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["40519341972351148061927493253565560391","92739509786593219801012166808793403257","179023984236093010935222896814260303731","256122672508829238289839645149202138909"]},"signature_version":"v1","signature_type":"Line","source":"https://github.com/mysql/mysql-server/commit/3f821bcb4ee93cd90c0ffa0f8e17bb9677502acf"},{"target":{"file":"storage/innobase/ddl/ddl0builder.cc"},"id":"CVE-2025-53062-fc8ed8c4","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["40519341972351148061927493253565560391","92739509786593219801012166808793403257","179023984236093010935222896814260303731","256122672508829238289839645149202138909"]},"signature_version":"v1","signature_type":"Line","source":"https://github.com/mysql/mysql-server/commit/2d6d5e10436a8f2b58d37af737c2a3e45855d0b7"}],"vanir_signatures_modified":"2026-04-11T01:48:20Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-53062.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}