{"id":"CVE-2025-53062","details":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and  9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-04-12T17:04:15.970591Z","published":"2025-10-21T20:20:46.377Z","related":["ALSA-2025:23008","ALSA-2025:23109","ALSA-2025:23111","ALSA-2025:23134","ALSA-2025:23137"],"references":[{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2025.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"fixed":"2d6d5e10436a8f2b58d37af737c2a3e45855d0b7"},{"introduced":"dc86e412f18b36ce271f791026714e8caa0ec919"},{"fixed":"3f821bcb4ee93cd90c0ffa0f8e17bb9677502acf"},{"introduced":"527c12ed611f3fe072c3043734319edb2c733099"},{"fixed":"b79ac1111737174c1b36ab5f63275f0191c000dc"}],"database_specific":{"versions":[{"introduced":"8.0.0"},{"fixed":"8.0.43"},{"introduced":"8.4.0"},{"fixed":"8.4.6"},{"introduced":"9.0.0"},{"fixed":"9.4.0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53062.json","vanir_signatures_modified":"2026-04-12T17:04:15Z","vanir_signatures":[{"id":"CVE-2025-53062-49413a0d","source":"https://github.com/mysql/mysql-server/commit/b79ac1111737174c1b36ab5f63275f0191c000dc","signature_version":"v1","digest":{"line_hashes":["40519341972351148061927493253565560391","92739509786593219801012166808793403257","179023984236093010935222896814260303731","256122672508829238289839645149202138909"],"threshold":0.9},"signature_type":"Line","deprecated":false,"target":{"file":"storage/innobase/ddl/ddl0builder.cc"}},{"id":"CVE-2025-53062-b64d8b57","source":"https://github.com/mysql/mysql-server/commit/3f821bcb4ee93cd90c0ffa0f8e17bb9677502acf","signature_version":"v1","digest":{"line_hashes":["40519341972351148061927493253565560391","92739509786593219801012166808793403257","179023984236093010935222896814260303731","256122672508829238289839645149202138909"],"threshold":0.9},"signature_type":"Line","deprecated":false,"target":{"file":"storage/innobase/ddl/ddl0builder.cc"}},{"id":"CVE-2025-53062-fc8ed8c4","source":"https://github.com/mysql/mysql-server/commit/2d6d5e10436a8f2b58d37af737c2a3e45855d0b7","signature_version":"v1","digest":{"line_hashes":["40519341972351148061927493253565560391","92739509786593219801012166808793403257","179023984236093010935222896814260303731","256122672508829238289839645149202138909"],"threshold":0.9},"signature_type":"Line","deprecated":false,"target":{"file":"storage/innobase/ddl/ddl0builder.cc"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}