{"id":"CVE-2021-35604","details":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).","aliases":["BIT-mariadb-2021-35604","BIT-mariadb-min-2021-35604","BIT-mysql-client-2021-35604"],"modified":"2026-04-16T04:30:39.766472556Z","published":"2021-10-20T11:17:06.087Z","related":["ALSA-2022:1556","ALSA-2022:1557","ALSA-2022:7119","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2021:3835-1","SUSE-SU-2021:3836-1","SUSE-SU-2021:3948-1","SUSE-SU-2021:4202-1","openSUSE-SU-2021:3835-1","openSUSE-SU-2024:11621-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"561b6c7e513abc4ceba263252b519bf715ce80f4"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"a2f147af35480e27bd599462db59b9b95f71acd9"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"a19ab67318760f8f155ef7f4f821dfc738542c67"},{"introduced":"7c7f9bef28aa566557da31402142f6dd8298ddd2"},{"fixed":"8635be6a2962f8e256c27836c35064ccaabb7486"},{"introduced":"1a647b700f6b72dc97211510a5d0c647d5d3d911"},{"fixed":"1f2ccc6db8a3e9be21d7ae599177380e2120d4af"}],"database_specific":{"versions":[{"introduced":"10.2.0"},{"fixed":"10.2.41"},{"introduced":"10.3.0"},{"fixed":"10.3.32"},{"introduced":"10.4.0"},{"fixed":"10.4.22"},{"introduced":"10.5.0"},{"fixed":"10.5.13"},{"introduced":"10.6.0"},{"fixed":"10.6.3"}]}},{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"89713bf41c33528c3e7682d219dc838915f5af9a"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"beb865a960b9a8a16cf999c323e46c5b0c67f21f"}],"database_specific":{"versions":[{"introduced":"5.7.0"},{"last_affected":"5.7.35"},{"introduced":"8.0.0"},{"last_affected":"8.0.26"}]}}],"versions":["mariadb-10.2.0","mariadb-10.2.1","mariadb-10.2.10","mariadb-10.2.11","mariadb-10.2.12","mariadb-10.2.13","mariadb-10.2.14","mariadb-10.2.15","mariadb-10.2.16","mariadb-10.2.18","mariadb-10.2.19","mariadb-10.2.2","mariadb-10.2.20","mariadb-10.2.21","mariadb-10.2.22","mariadb-10.2.23","mariadb-10.2.24","mariadb-10.2.25","mariadb-10.2.26","mariadb-10.2.27","mariadb-10.2.28","mariadb-10.2.29","mariadb-10.2.30","mariadb-10.2.31","mariadb-10.2.39","mariadb-10.2.40","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.3.1","mariadb-10.3.10","mariadb-10.3.12","mariadb-10.3.16","mariadb-10.3.17","mariadb-10.3.18","mariadb-10.3.19","mariadb-10.3.2","mariadb-10.3.20","mariadb-10.3.21","mariadb-10.3.26","mariadb-10.3.30","mariadb-10.3.31","mariadb-10.3.4","mariadb-10.3.5","mariadb-10.3.6","mariadb-10.3.7","mariadb-10.4.10","mariadb-10.4.11","mariadb-10.4.20","mariadb-10.4.21","mariadb-10.4.3","mariadb-10.4.4","mariadb-10.4.5","mariadb-10.4.7","mariadb-10.4.9","mariadb-10.5.0","mariadb-10.5.11","mariadb-10.5.12","mariadb-10.5.2","mariadb-10.5.4","mariadb-10.6.0","mariadb-10.6.1","mariadb-10.6.2","mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.7.31","mysql-5.7.32","mysql-5.7.35","mysql-8.0.26","mysql-cluster-8.0.26"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/mariadb/server/commit/561b6c7e513abc4ceba263252b519bf715ce80f4","id":"CVE-2021-35604-0f0e4c3d","signature_type":"Line","deprecated":false,"signature_version":"v1","target":{"file":"sql/sp_head.cc"},"digest":{"line_hashes":["131649957694533731721940309055820975752","249452647439853322414702137565205958351","201969777012246482841882403852745931746","95578070551738783324854304889376330162","249398730562238721197312579126910521732","272906839712165971131454335608419438521","107318663712936600961191413243544821067","180839139384475678538465324643300020059","282394023504767334221966027397455256851"],"threshold":0.9}},{"signature_version":"v1","id":"CVE-2021-35604-a5b111ca","signature_type":"Line","deprecated":false,"target":{"file":"sql/sql_class.h"},"source":"https://github.com/mariadb/server/commit/561b6c7e513abc4ceba263252b519bf715ce80f4","digest":{"line_hashes":["246197311705367672488779414942418338437","276461508094209904860358154457724219596","119856287420192600807656416768471292892","307523178086602816378726753514303591471"],"threshold":0.9}},{"target":{"function":"trans_cannot_safely_rollback","file":"sql/log.cc"},"id":"CVE-2021-35604-c0b6a67c","signature_type":"Function","deprecated":false,"source":"https://github.com/mariadb/server/commit/561b6c7e513abc4ceba263252b519bf715ce80f4","signature_version":"v1","digest":{"function_hash":"313645379892638120418940088368384842330","length":526}},{"target":{"function":"MYSQL_BIN_LOG::write","file":"sql/log.cc"},"id":"CVE-2021-35604-c2087e13","signature_type":"Function","deprecated":false,"source":"https://github.com/mariadb/server/commit/561b6c7e513abc4ceba263252b519bf715ce80f4","signature_version":"v1","digest":{"function_hash":"58969679078610265830587969385269203468","length":5738}},{"target":{"function":"binlog_rollback","file":"sql/log.cc"},"id":"CVE-2021-35604-c7e73326","signature_type":"Function","deprecated":false,"source":"https://github.com/mariadb/server/commit/561b6c7e513abc4ceba263252b519bf715ce80f4","signature_version":"v1","digest":{"function_hash":"306699274100027957454330329145370130558","length":1646}},{"target":{"file":"sql/log.cc"},"id":"CVE-2021-35604-cbcd0de0","signature_type":"Line","deprecated":false,"source":"https://github.com/mariadb/server/commit/561b6c7e513abc4ceba263252b519bf715ce80f4","signature_version":"v1","digest":{"line_hashes":["37241440461655139304666183504430673984","321123901233127987586838407173769763021","72261390377549520472738172439120219059","177685578562853608336609164621767055897","89819371651002091070891492658372534238","51099385615472244965869900895991310181","46580225994766933062920841006192426125","315917086551178982883049352244998712855","151578589657138643687922568393137771305","17554905964382256978464037543366371516","44471072352567830517014260687216170718","24734019721218526304965298857312980362","170961031791040395953313676921959415915","270863138330118960816828040809003942807","193741668719766893391486278801760873722","187930135527712657567073811467820013048","463263057525947197303571514490382636","339713228808563234771781256013265010488","60867587337001395239385720816441536057","201702182182638939619765504430616936017","57432871140975116606615382999074109620","84713255884193508387326659336658799628","26176627625780710469062407865406490363","43796184043138950845306782231229762899","324404121552377421361400005592716783209","327933765027016333514108949053193264778","64468012293600814982757536651285167827","7202594327949745606575738191994274437","262509239196084693497735668412073064246","337977078646117299838774945463804836390","10862040297338291254194597838720262756","83515971079454692103282106460082729171","189738111660857520124962685258236418556","32778699285218945562928993184558074443","218701964979892061313721302653462012734","187533463339481117482532077546372282049","202341581865934325003292198703136040956","155258852623302621764107560349238231581","159919742848761288642405190297761552689","147668741816814608585313009494181079624","218818688557001123571703121311150830495","148772925594895409927511713164729652512","95985790907239484288997369415539433967","255840666226744218838219627455521697435","255600561411523879536850015147493893481","27747137695801633233169226083338797085"],"threshold":0.9}},{"target":{"file":"sql/handler.h"},"id":"CVE-2021-35604-cd9394d7","signature_type":"Line","deprecated":false,"source":"https://github.com/mariadb/server/commit/561b6c7e513abc4ceba263252b519bf715ce80f4","signature_version":"v1","digest":{"line_hashes":["119521046618748345254444704918727070434","200452323826260590731762179699296029024","251509020612362925913253356211500341353","261751524541214367584170806104141027470","201306130400997636080714619460096506715","35155932094167429544231535939915658820"],"threshold":0.9}},{"target":{"function":"sp_lex_keeper::reset_lex_and_exec_core","file":"sql/sp_head.cc"},"id":"CVE-2021-35604-ed8021c5","signature_type":"Function","deprecated":false,"source":"https://github.com/mariadb/server/commit/561b6c7e513abc4ceba263252b519bf715ce80f4","signature_version":"v1","digest":{"function_hash":"336328390458211521927718962871514707351","length":2658}}],"vanir_signatures_modified":"2026-04-11T16:25:55Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-35604.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}]}