{"id":"CVE-2026-21936","details":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and  9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-04-17T13:29:24.521590282Z","published":"2026-01-20T22:15:56.277Z","related":["ALSA-2026:4162","ALSA-2026:4828","ALSA-2026:5580","ALSA-2026:5640","ALSA-2026:6391"],"references":[{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2026.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"93fc20b7af1af1bbb6581cf52c1d35d326be3a01"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"153abc27b7dda30b455c0d99e657dac4e39e3505"},{"introduced":"dc86e412f18b36ce271f791026714e8caa0ec919"},{"last_affected":"aa461240270d809bcac336483b886b3d1789d4d9"},{"introduced":"527c12ed611f3fe072c3043734319edb2c733099"},{"last_affected":"056a391cdc1af9b17b5415aee243483d1bac532d"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"153abc27b7dda30b455c0d99e657dac4e39e3505"},{"introduced":"dc86e412f18b36ce271f791026714e8caa0ec919"},{"last_affected":"aa461240270d809bcac336483b886b3d1789d4d9"},{"introduced":"527c12ed611f3fe072c3043734319edb2c733099"},{"last_affected":"056a391cdc1af9b17b5415aee243483d1bac532d"}],"database_specific":{"versions":[{"introduced":"7.6.0"},{"last_affected":"7.6.36"},{"introduced":"8.0.0"},{"last_affected":"8.0.44"},{"introduced":"8.4.0"},{"last_affected":"8.4.7"},{"introduced":"9.0.0"},{"last_affected":"9.5.0"},{"introduced":"8.0.0"},{"last_affected":"8.0.44"},{"introduced":"8.4.0"},{"last_affected":"8.4.7"},{"introduced":"9.0.0"},{"last_affected":"9.5.0"}]}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.7-22-ndb-7.6.6","mysql-8.0.40","mysql-8.0.41","mysql-8.0.44","mysql-8.4.1","mysql-8.4.3","mysql-8.4.4","mysql-8.4.7","mysql-9.0.0-release","mysql-9.5.0","mysql-cluster-7.5.2","mysql-cluster-7.6.11","mysql-cluster-7.6.15","mysql-cluster-7.6.16","mysql-cluster-7.6.19","mysql-cluster-7.6.20","mysql-cluster-7.6.24","mysql-cluster-7.6.28","mysql-cluster-7.6.30","mysql-cluster-7.6.31","mysql-cluster-7.6.33","mysql-cluster-7.6.34","mysql-cluster-7.6.36","mysql-cluster-8.0.40","mysql-cluster-8.0.41","mysql-cluster-8.0.44","mysql-cluster-8.4.1","mysql-cluster-8.4.3","mysql-cluster-8.4.4","mysql-cluster-8.4.7","mysql-cluster-9.5.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21936.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}