{"id":"CVE-2016-5624","details":"Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.","modified":"2026-04-11T04:02:20.174179Z","published":"2016-10-25T14:31:38.600Z","related":["MGASA-2016-0371","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2016:2932-1","SUSE-SU-2016:2933-1","openSUSE-SU-2024:11038-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2927.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2928.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93635"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037050"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"c7e1c89070e34e13cb4a3e947021b91fb211959a"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"6925689ca829901567e9503fd4fdce443f9a7d53"}],"database_specific":{"versions":[{"introduced":"10.0.0"},{"fixed":"10.0.28"},{"introduced":"10.1.0"},{"fixed":"10.1.18"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"last_affected":"7d57772f47e0d69b2e2a7bcd62da59e54f8c8343"},{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"fixed":"754e7eff2872995e2b6e62f9da7448587a411c7b"},{"introduced":"0"},{"last_affected":"a5893933ee2698c632e14b06195a4c7883d4dcf7"},{"introduced":"0"},{"last_affected":"ae41ce7c4ecff5e1e336ab768867370b8c94e02d"},{"introduced":"0"},{"last_affected":"a5893933ee2698c632e14b06195a4c7883d4dcf7"},{"introduced":"0"},{"last_affected":"a5893933ee2698c632e14b06195a4c7883d4dcf7"}],"database_specific":{"versions":[{"introduced":"5.5.0"},{"last_affected":"5.5.51"},{"introduced":"5.5.0"},{"fixed":"5.5.52"},{"introduced":"0"},{"last_affected":"7.3"},{"introduced":"0"},{"last_affected":"7.5"},{"introduced":"0"},{"last_affected":"7.3"},{"introduced":"0"},{"last_affected":"7.3"}]}}],"versions":["mariadb-10.1.0","mariadb-10.1.10","mariadb-10.1.11","mariadb-10.1.12","mariadb-10.1.13","mariadb-10.1.14","mariadb-10.1.15","mariadb-10.1.16","mariadb-10.1.17","mariadb-10.1.2","mariadb-10.1.3","mariadb-10.1.4","mariadb-10.1.5","mariadb-10.1.6","mariadb-10.1.7","mariadb-10.1.8","mariadb-10.1.9","mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.5.15","mysql-5.5.19","mysql-5.5.23","mysql-5.5.25","mysql-5.5.27","mysql-5.5.44","mysql-5.5.47","mysql-5.5.49","mysql-5.5.51","mysql-cluster-7.3","mysql-cluster-7.3.10","mysql-cluster-7.3.11","mysql-cluster-7.3.12","mysql-cluster-7.3.9","mysql-cluster-7.5.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5624.json","vanir_signatures_modified":"2026-04-11T04:02:20Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"vanir_signatures":[{"source":"https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53","target":{"file":"sql/mysqld.cc"},"digest":{"threshold":0.9,"line_hashes":["10300787521009057356635998495684155765","192111626566387172416930231159549664701","200649067802958136682873101511178304844","139512347727877704466775504772460481116"]},"id":"CVE-2016-5624-0450532a","deprecated":false,"signature_version":"v1","signature_type":"Line"},{"source":"https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53","target":{"function":"wsrep_init_startup","file":"sql/wsrep_mysqld.cc"},"digest":{"function_hash":"132261035674861403256292598415004597670","length":507},"id":"CVE-2016-5624-14e2f95c","deprecated":false,"signature_version":"v1","signature_type":"Function"},{"source":"https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53","target":{"function":"init_server_components","file":"sql/mysqld.cc"},"digest":{"function_hash":"332731388677987676617497379852326324426","length":10442},"id":"CVE-2016-5624-ad13bcb6","deprecated":false,"signature_version":"v1","signature_type":"Function"},{"source":"https://github.com/mariadb/server/commit/6925689ca829901567e9503fd4fdce443f9a7d53","target":{"file":"sql/wsrep_mysqld.cc"},"digest":{"threshold":0.9,"line_hashes":["48322688254895416229170939282175586315","246612037741245845170913514545422239772","63643117174896252787942841139351789137","12461612565261460537925623326578810451"]},"id":"CVE-2016-5624-f35317e8","deprecated":false,"signature_version":"v1","signature_type":"Line"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}