alsa-2022:6590
Vulnerability from osv_almalinux
Published
2022-09-20 00:00
Modified
2022-10-19 07:05
Summary
Moderate: mysql security, bug fix, and enhancement update
Details

MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)

Security Fix(es):

  • mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)
  • mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)
  • mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)
  • mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)
  • mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)
  • mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
  • mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)
  • mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)
  • mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)
  • mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)
  • mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)
  • mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)
  • mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)
  • mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)
  • mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)
  • mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Default logrotate set to wrong log file (BZ#2122592)
References
https://access.redhat.com/errata/RHSA-2022:6590 ADVISORY
https://access.redhat.com/security/cve/CVE-2022-21412 REPORT
https://access.redhat.com/security/cve/CVE-2022-21413 REPORT
https://access.redhat.com/security/cve/CVE-2022-21414 REPORT
https://access.redhat.com/security/cve/CVE-2022-21415 REPORT
https://access.redhat.com/security/cve/CVE-2022-21417 REPORT
https://access.redhat.com/security/cve/CVE-2022-21418 REPORT
https://access.redhat.com/security/cve/CVE-2022-21423 REPORT
https://access.redhat.com/security/cve/CVE-2022-21425 REPORT
https://access.redhat.com/security/cve/CVE-2022-21427 REPORT
https://access.redhat.com/security/cve/CVE-2022-21435 REPORT
https://access.redhat.com/security/cve/CVE-2022-21436 REPORT
https://access.redhat.com/security/cve/CVE-2022-21437 REPORT
https://access.redhat.com/security/cve/CVE-2022-21438 REPORT
https://access.redhat.com/security/cve/CVE-2022-21440 REPORT
https://access.redhat.com/security/cve/CVE-2022-21444 REPORT
https://access.redhat.com/security/cve/CVE-2022-21451 REPORT
https://access.redhat.com/security/cve/CVE-2022-21452 REPORT
https://access.redhat.com/security/cve/CVE-2022-21454 REPORT
https://access.redhat.com/security/cve/CVE-2022-21455 REPORT
https://access.redhat.com/security/cve/CVE-2022-21457 REPORT
https://access.redhat.com/security/cve/CVE-2022-21459 REPORT
https://access.redhat.com/security/cve/CVE-2022-21460 REPORT
https://access.redhat.com/security/cve/CVE-2022-21462 REPORT
https://access.redhat.com/security/cve/CVE-2022-21478 REPORT
https://access.redhat.com/security/cve/CVE-2022-21479 REPORT
https://access.redhat.com/security/cve/CVE-2022-21509 REPORT
https://access.redhat.com/security/cve/CVE-2022-21515 REPORT
https://access.redhat.com/security/cve/CVE-2022-21517 REPORT
https://access.redhat.com/security/cve/CVE-2022-21522 REPORT
https://access.redhat.com/security/cve/CVE-2022-21525 REPORT
https://access.redhat.com/security/cve/CVE-2022-21526 REPORT
https://access.redhat.com/security/cve/CVE-2022-21527 REPORT
https://access.redhat.com/security/cve/CVE-2022-21528 REPORT
https://access.redhat.com/security/cve/CVE-2022-21529 REPORT
https://access.redhat.com/security/cve/CVE-2022-21530 REPORT
https://access.redhat.com/security/cve/CVE-2022-21531 REPORT
https://access.redhat.com/security/cve/CVE-2022-21534 REPORT
https://access.redhat.com/security/cve/CVE-2022-21537 REPORT
https://access.redhat.com/security/cve/CVE-2022-21538 REPORT
https://access.redhat.com/security/cve/CVE-2022-21539 REPORT
https://access.redhat.com/security/cve/CVE-2022-21547 REPORT
https://access.redhat.com/security/cve/CVE-2022-21553 REPORT
https://access.redhat.com/security/cve/CVE-2022-21556 REPORT
https://access.redhat.com/security/cve/CVE-2022-21569 REPORT
https://bugzilla.redhat.com/2082636 REPORT
https://bugzilla.redhat.com/2082637 REPORT
https://bugzilla.redhat.com/2082638 REPORT
https://bugzilla.redhat.com/2082639 REPORT
https://bugzilla.redhat.com/2082640 REPORT
https://bugzilla.redhat.com/2082641 REPORT
https://bugzilla.redhat.com/2082642 REPORT
https://bugzilla.redhat.com/2082643 REPORT
https://bugzilla.redhat.com/2082644 REPORT
https://bugzilla.redhat.com/2082645 REPORT
https://bugzilla.redhat.com/2082646 REPORT
https://bugzilla.redhat.com/2082647 REPORT
https://bugzilla.redhat.com/2082648 REPORT
https://bugzilla.redhat.com/2082649 REPORT
https://bugzilla.redhat.com/2082650 REPORT
https://bugzilla.redhat.com/2082651 REPORT
https://bugzilla.redhat.com/2082652 REPORT
https://bugzilla.redhat.com/2082653 REPORT
https://bugzilla.redhat.com/2082654 REPORT
https://bugzilla.redhat.com/2082655 REPORT
https://bugzilla.redhat.com/2082656 REPORT
https://bugzilla.redhat.com/2082657 REPORT
https://bugzilla.redhat.com/2082658 REPORT
https://bugzilla.redhat.com/2082659 REPORT
https://bugzilla.redhat.com/2115282 REPORT
https://bugzilla.redhat.com/2115283 REPORT
https://bugzilla.redhat.com/2115284 REPORT
https://bugzilla.redhat.com/2115285 REPORT
https://bugzilla.redhat.com/2115286 REPORT
https://bugzilla.redhat.com/2115287 REPORT
https://bugzilla.redhat.com/2115288 REPORT
https://bugzilla.redhat.com/2115289 REPORT
https://bugzilla.redhat.com/2115290 REPORT
https://bugzilla.redhat.com/2115291 REPORT
https://bugzilla.redhat.com/2115292 REPORT
https://bugzilla.redhat.com/2115293 REPORT
https://bugzilla.redhat.com/2115294 REPORT
https://bugzilla.redhat.com/2115295 REPORT
https://bugzilla.redhat.com/2115296 REPORT
https://bugzilla.redhat.com/2115297 REPORT
https://bugzilla.redhat.com/2115298 REPORT
https://bugzilla.redhat.com/2115299 REPORT
https://bugzilla.redhat.com/2115300 REPORT
https://bugzilla.redhat.com/2115301 REPORT
https://errata.almalinux.org/9/ALSA-2022-6590.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.30-3.el9_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-common"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.30-3.el9_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.30-3.el9_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-errmsg"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.30-3.el9_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.30-3.el9_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-server"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.30-3.el9_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-test"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.30-3.el9_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)\n\nSecurity Fix(es):\n\n* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)\n* mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)\n* mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)\n* mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)\n* mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)\n* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)\n* mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)\n* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)\n* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)\n* mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)\n* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)\n* mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)\n* mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)\n* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)\n* mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)\n* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Default logrotate set to wrong log file (BZ#2122592)",
  "id": "ALSA-2022:6590",
  "modified": "2022-10-19T07:05:51Z",
  "published": "2022-09-20T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2022:6590"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21412"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21413"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21414"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21415"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21417"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21418"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21423"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21425"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21427"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21435"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21436"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21437"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21438"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21440"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21444"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21451"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21452"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21454"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21455"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21457"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21459"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21460"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21462"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21478"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21479"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21509"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21515"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21517"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21522"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21525"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21526"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21527"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21528"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21529"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21530"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21531"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21534"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21537"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21538"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21539"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21547"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21553"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21556"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-21569"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082636"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082637"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082638"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082639"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082640"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082641"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082642"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082643"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082644"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082645"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082646"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082647"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082648"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082649"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082650"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082651"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082652"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082653"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082654"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082655"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082656"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082657"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082658"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2082659"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115282"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115283"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115284"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115285"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115286"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115287"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115288"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115289"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115290"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115291"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115292"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115293"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115294"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115295"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115296"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115297"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115298"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115299"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115300"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2115301"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/9/ALSA-2022-6590.html"
    }
  ],
  "related": [
    "CVE-2022-21412",
    "CVE-2022-21414",
    "CVE-2022-21435",
    "CVE-2022-21436",
    "CVE-2022-21437",
    "CVE-2022-21438",
    "CVE-2022-21440",
    "CVE-2022-21452",
    "CVE-2022-21459",
    "CVE-2022-21462",
    "CVE-2022-21478",
    "CVE-2022-21479",
    "CVE-2022-21413",
    "CVE-2022-21415",
    "CVE-2022-21417",
    "CVE-2022-21418",
    "CVE-2022-21451",
    "CVE-2022-21423",
    "CVE-2022-21425",
    "CVE-2022-21444",
    "CVE-2022-21427",
    "CVE-2022-21454",
    "CVE-2022-21455",
    "CVE-2022-21457",
    "CVE-2022-21460",
    "CVE-2022-21509",
    "CVE-2022-21525",
    "CVE-2022-21526",
    "CVE-2022-21527",
    "CVE-2022-21528",
    "CVE-2022-21529",
    "CVE-2022-21530",
    "CVE-2022-21531",
    "CVE-2022-21553",
    "CVE-2022-21556",
    "CVE-2022-21569",
    "CVE-2022-21515",
    "CVE-2022-21517",
    "CVE-2022-21537",
    "CVE-2022-21539",
    "CVE-2022-21522",
    "CVE-2022-21534",
    "CVE-2022-21547",
    "CVE-2022-21538"
  ],
  "summary": "Moderate: mysql security, bug fix, and enhancement update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…