CVE-2016-5624

Source
https://cve.org/CVERecord?id=CVE-2016-5624
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5624.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-5624
Downstream
Related
Published
2016-10-25T14:31:38.600Z
Modified
2026-02-13T00:06:45.336721Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.

References

Affected packages

Git / github.com/mariadb/server

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5624.json"
vanir_signatures
[
    {
        "signature_type": "Line",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "10300787521009057356635998495684155765",
                "192111626566387172416930231159549664701",
                "200649067802958136682873101511178304844",
                "139512347727877704466775504772460481116"
            ]
        },
        "id": "CVE-2016-5624-0450532a",
        "target": {
            "file": "sql/mysqld.cc"
        },
        "signature_version": "v1",
        "source": "https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "digest": {
            "length": 507.0,
            "function_hash": "132261035674861403256292598415004597670"
        },
        "id": "CVE-2016-5624-14e2f95c",
        "target": {
            "file": "sql/wsrep_mysqld.cc",
            "function": "wsrep_init_startup"
        },
        "signature_version": "v1",
        "source": "https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "digest": {
            "length": 959.0,
            "function_hash": "47680797230902467167302628199339563633"
        },
        "id": "CVE-2016-5624-2a898b33",
        "target": {
            "file": "sql/item_subselect.cc",
            "function": "check_equality_for_exist2in"
        },
        "signature_version": "v1",
        "source": "https://github.com/mariadb/server/commit/eca8c324e9a02f530853580991b11b587f54b24a"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "293394144957876503757856302892818404245",
                "229064536313748410484257764862311968415",
                "142009885623922541628359401514852856203",
                "298081790708139303958931797345617382395",
                "200510622636731660204409832348005484980"
            ]
        },
        "id": "CVE-2016-5624-4511b5f6",
        "target": {
            "file": "sql/item_subselect.cc"
        },
        "signature_version": "v1",
        "source": "https://github.com/mariadb/server/commit/eca8c324e9a02f530853580991b11b587f54b24a"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "digest": {
            "length": 10442.0,
            "function_hash": "332731388677987676617497379852326324426"
        },
        "id": "CVE-2016-5624-ad13bcb6",
        "target": {
            "file": "sql/mysqld.cc",
            "function": "init_server_components"
        },
        "signature_version": "v1",
        "source": "https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "48322688254895416229170939282175586315",
                "246612037741245845170913514545422239772",
                "63643117174896252787942841139351789137",
                "12461612565261460537925623326578810451"
            ]
        },
        "id": "CVE-2016-5624-f35317e8",
        "target": {
            "file": "sql/wsrep_mysqld.cc"
        },
        "signature_version": "v1",
        "source": "https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53"
    }
]

Git / github.com/mysql/mysql-server

Affected ranges

Type
GIT
Repo
https://github.com/mysql/mysql-server
Events

Affected versions

mysql-5.*
mysql-5.0.87sp1
mysql-5.0.90
mysql-5.0.91
mysql-5.0.92
mysql-5.0.93
mysql-5.0.94
mysql-5.0.95
mysql-5.0.96
mysql-5.1.40sp1
mysql-5.1.41
mysql-5.1.42
mysql-5.1.43
mysql-5.1.43sp1
mysql-5.1.44
mysql-5.1.45
mysql-5.1.46
mysql-5.1.46sp1
mysql-5.1.47
mysql-5.1.48
mysql-5.1.49
mysql-5.1.49sp1
mysql-5.1.50
mysql-5.1.51
mysql-5.1.52
mysql-5.1.52sp1
mysql-5.1.53
mysql-5.1.54
mysql-5.1.55
mysql-5.1.56
mysql-5.1.57
mysql-5.1.58
mysql-5.1.59
mysql-5.1.60
mysql-5.1.61
mysql-5.1.62
mysql-5.1.63
mysql-5.1.65
mysql-5.1.66
mysql-5.1.67
mysql-5.1.68
mysql-5.1.69
mysql-5.1.69-retag
mysql-5.1.70
mysql-5.1.71
mysql-5.1.72
mysql-5.1.73
mysql-5.1.74
mysql-5.1.75
mysql-5.1.76
mysql-5.1.77
mysql-5.5.0
mysql-5.5.1-m2
mysql-5.5.10
mysql-5.5.11
mysql-5.5.12
mysql-5.5.13
mysql-5.5.14
mysql-5.5.15
mysql-5.5.16
mysql-5.5.17
mysql-5.5.18
mysql-5.5.19
mysql-5.5.2-m2
mysql-5.5.20
mysql-5.5.21
mysql-5.5.22
mysql-5.5.23
mysql-5.5.24
mysql-5.5.25
mysql-5.5.25a
mysql-5.5.27
mysql-5.5.28
mysql-5.5.29
mysql-5.5.3-m3
mysql-5.5.30
mysql-5.5.31
mysql-5.5.32
mysql-5.5.33
mysql-5.5.34
mysql-5.5.35
mysql-5.5.36
mysql-5.5.37
mysql-5.5.38
mysql-5.5.39
mysql-5.5.40
mysql-5.5.41
mysql-5.5.42
mysql-5.5.43
mysql-5.5.44
mysql-5.5.45
mysql-5.5.46
mysql-5.5.47
mysql-5.5.48
mysql-5.5.49
mysql-5.5.5-m3
mysql-5.5.50
mysql-5.5.51
mysql-5.5.6-rc
mysql-5.5.7
mysql-5.5.8
mysql-5.5.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5624.json"