alsa-2022:6590
Vulnerability from osv_almalinux
Published
2022-09-20 00:00
Modified
2022-10-19 07:05
Summary
Moderate: mysql security, bug fix, and enhancement update
Details
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)
Security Fix(es):
- mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)
- mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)
- mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)
- mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)
- mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)
- mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
- mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)
- mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)
- mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)
- mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)
- mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)
- mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)
- mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)
- mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)
- mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)
- mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Default logrotate set to wrong log file (BZ#2122592)
References
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.30-3.el9_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.30-3.el9_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.30-3.el9_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.30-3.el9_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.30-3.el9_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.30-3.el9_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.30-3.el9_0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)\n\nSecurity Fix(es):\n\n* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)\n* mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)\n* mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)\n* mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)\n* mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)\n* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)\n* mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)\n* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)\n* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)\n* mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)\n* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)\n* mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)\n* mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)\n* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)\n* mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)\n* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Default logrotate set to wrong log file (BZ#2122592)",
"id": "ALSA-2022:6590",
"modified": "2022-10-19T07:05:51Z",
"published": "2022-09-20T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6590"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21412"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21413"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21414"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21415"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21417"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21418"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21423"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21425"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21427"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21435"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21436"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21437"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21438"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21440"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21444"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21451"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21452"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21454"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21455"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21457"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21459"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21460"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21462"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21478"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21479"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21509"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21515"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21517"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21522"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21526"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21527"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21528"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21529"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21530"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21531"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21534"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21537"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21538"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21539"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21547"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21553"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21556"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-21569"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082636"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082637"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082638"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082639"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082640"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082641"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082642"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082643"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082644"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082645"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082646"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082647"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082648"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082649"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082650"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082651"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082652"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082653"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082654"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082655"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082656"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082657"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082658"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2082659"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115282"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115283"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115285"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115286"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115287"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115288"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115289"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115290"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115292"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115293"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115294"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115296"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115297"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115298"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115299"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115300"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2115301"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2022-6590.html"
}
],
"related": [
"CVE-2022-21412",
"CVE-2022-21414",
"CVE-2022-21435",
"CVE-2022-21436",
"CVE-2022-21437",
"CVE-2022-21438",
"CVE-2022-21440",
"CVE-2022-21452",
"CVE-2022-21459",
"CVE-2022-21462",
"CVE-2022-21478",
"CVE-2022-21479",
"CVE-2022-21413",
"CVE-2022-21415",
"CVE-2022-21417",
"CVE-2022-21418",
"CVE-2022-21451",
"CVE-2022-21423",
"CVE-2022-21425",
"CVE-2022-21444",
"CVE-2022-21427",
"CVE-2022-21454",
"CVE-2022-21455",
"CVE-2022-21457",
"CVE-2022-21460",
"CVE-2022-21509",
"CVE-2022-21525",
"CVE-2022-21526",
"CVE-2022-21527",
"CVE-2022-21528",
"CVE-2022-21529",
"CVE-2022-21530",
"CVE-2022-21531",
"CVE-2022-21553",
"CVE-2022-21556",
"CVE-2022-21569",
"CVE-2022-21515",
"CVE-2022-21517",
"CVE-2022-21537",
"CVE-2022-21539",
"CVE-2022-21522",
"CVE-2022-21534",
"CVE-2022-21547",
"CVE-2022-21538"
],
"summary": "Moderate: mysql security, bug fix, and enhancement update"
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…