alsa-2024:1141
Vulnerability from osv_almalinux
Published
2024-03-05 00:00
Modified
2024-03-07 19:03
Summary
Moderate: mysql security update
Details

MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

Security Fix(es):

  • mysql: InnoDB unspecified vulnerability (CPU Apr 2023) (CVE-2023-21911)
  • mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) (CVE-2023-21919, CVE-2023-21929, CVE-2023-21933)
  • mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) (CVE-2023-21920, CVE-2023-21935, CVE-2023-21945, CVE-2023-21946, CVE-2023-21976, CVE-2023-21977, CVE-2023-21982)
  • mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) (CVE-2023-21940, CVE-2023-21947, CVE-2023-21962)
  • mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) (CVE-2023-21953)
  • mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) (CVE-2023-21955)
  • mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) (CVE-2023-21966)
  • mysql: Server: DML unspecified vulnerability (CPU Apr 2023) (CVE-2023-21972)
  • mysql: Client programs unspecified vulnerability (CPU Apr 2023) (CVE-2023-21980)
  • mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) (CVE-2023-22005, CVE-2023-22007, CVE-2023-22057)
  • mysql: InnoDB unspecified vulnerability (CPU Jul 2023) (CVE-2023-22008)
  • mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) (CVE-2023-22032, CVE-2023-22059, CVE-2023-22064, CVE-2023-22065, CVE-2023-22070, CVE-2023-22078, CVE-2023-22079, CVE-2023-22092, CVE-2023-22103, CVE-2023-22110, CVE-2023-22112)
  • mysql: InnoDB unspecified vulnerability (CPU Jul 2023) (CVE-2023-22033)
  • mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) (CVE-2023-22046)
  • mysql: Client programs unspecified vulnerability (CPU Jul 2023) (CVE-2023-22053, CVE-2023-22054, CVE-2023-22056)
  • mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) (CVE-2023-22058)
  • mysql: InnoDB unspecified vulnerability (CPU Oct 2023) (CVE-2023-22066, CVE-2023-22068, CVE-2023-22084, CVE-2023-22097, CVE-2023-22104, CVE-2023-22114)
  • mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) (CVE-2023-22111)
  • mysql: Server: DML unspecified vulnerability (CPU Oct 2023) (CVE-2023-22115)
  • mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) (CVE-2024-20960)
  • mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) (CVE-2024-20961, CVE-2024-20962, CVE-2024-20965, CVE-2024-20966, CVE-2024-2097, CVE-2024-20971, CVE-2024-20972, CVE-2024-20973, CVE-2024-20974, CVE-2024-20976, CVE-2024-20977, CVE-2024-20978, CVE-2024-20982)
  • mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) (CVE-2024-20963)
  • mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) (CVE-2024-20964)
  • mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) (CVE-2024-20967)
  • mysql: Server: Options unspecified vulnerability (CPU Jan 2024) (CVE-2024-20968)
  • mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) (CVE-2024-20969)
  • mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) (CVE-2024-20981)
  • mysql: Server: DML unspecified vulnerability (CPU Jan 2024) (CVE-2024-20983)
  • mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) (CVE-2024-20984)
  • mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) (CVE-2024-20985)
  • zstd: mysql: buffer overrun in util.c (CVE-2022-4899)
  • mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) (CVE-2023-22038)
  • mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) (CVE-2023-22048)
  • mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) (CVE-2023-22113)

Bug Fix(es):

  • Fix for MySQL bug #33630199 in 8.0.32 introduces regression when --set-gtid-purged=OFF (AlmaLinux-22454)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
https://access.redhat.com/errata/RHSA-2024:1141 ADVISORY
https://access.redhat.com/security/cve/CVE-2022-4899 REPORT
https://access.redhat.com/security/cve/CVE-2023-21911 REPORT
https://access.redhat.com/security/cve/CVE-2023-21919 REPORT
https://access.redhat.com/security/cve/CVE-2023-21920 REPORT
https://access.redhat.com/security/cve/CVE-2023-21929 REPORT
https://access.redhat.com/security/cve/CVE-2023-21933 REPORT
https://access.redhat.com/security/cve/CVE-2023-21935 REPORT
https://access.redhat.com/security/cve/CVE-2023-21940 REPORT
https://access.redhat.com/security/cve/CVE-2023-21945 REPORT
https://access.redhat.com/security/cve/CVE-2023-21946 REPORT
https://access.redhat.com/security/cve/CVE-2023-21947 REPORT
https://access.redhat.com/security/cve/CVE-2023-21953 REPORT
https://access.redhat.com/security/cve/CVE-2023-21955 REPORT
https://access.redhat.com/security/cve/CVE-2023-21962 REPORT
https://access.redhat.com/security/cve/CVE-2023-21966 REPORT
https://access.redhat.com/security/cve/CVE-2023-21972 REPORT
https://access.redhat.com/security/cve/CVE-2023-21976 REPORT
https://access.redhat.com/security/cve/CVE-2023-21977 REPORT
https://access.redhat.com/security/cve/CVE-2023-21980 REPORT
https://access.redhat.com/security/cve/CVE-2023-21982 REPORT
https://access.redhat.com/security/cve/CVE-2023-22005 REPORT
https://access.redhat.com/security/cve/CVE-2023-22007 REPORT
https://access.redhat.com/security/cve/CVE-2023-22008 REPORT
https://access.redhat.com/security/cve/CVE-2023-22032 REPORT
https://access.redhat.com/security/cve/CVE-2023-22033 REPORT
https://access.redhat.com/security/cve/CVE-2023-22038 REPORT
https://access.redhat.com/security/cve/CVE-2023-22046 REPORT
https://access.redhat.com/security/cve/CVE-2023-22048 REPORT
https://access.redhat.com/security/cve/CVE-2023-22053 REPORT
https://access.redhat.com/security/cve/CVE-2023-22054 REPORT
https://access.redhat.com/security/cve/CVE-2023-22056 REPORT
https://access.redhat.com/security/cve/CVE-2023-22057 REPORT
https://access.redhat.com/security/cve/CVE-2023-22058 REPORT
https://access.redhat.com/security/cve/CVE-2023-22059 REPORT
https://access.redhat.com/security/cve/CVE-2023-22064 REPORT
https://access.redhat.com/security/cve/CVE-2023-22065 REPORT
https://access.redhat.com/security/cve/CVE-2023-22066 REPORT
https://access.redhat.com/security/cve/CVE-2023-22068 REPORT
https://access.redhat.com/security/cve/CVE-2023-22070 REPORT
https://access.redhat.com/security/cve/CVE-2023-22078 REPORT
https://access.redhat.com/security/cve/CVE-2023-22079 REPORT
https://access.redhat.com/security/cve/CVE-2023-22084 REPORT
https://access.redhat.com/security/cve/CVE-2023-22092 REPORT
https://access.redhat.com/security/cve/CVE-2023-22097 REPORT
https://access.redhat.com/security/cve/CVE-2023-22103 REPORT
https://access.redhat.com/security/cve/CVE-2023-22104 REPORT
https://access.redhat.com/security/cve/CVE-2023-22110 REPORT
https://access.redhat.com/security/cve/CVE-2023-22111 REPORT
https://access.redhat.com/security/cve/CVE-2023-22112 REPORT
https://access.redhat.com/security/cve/CVE-2023-22113 REPORT
https://access.redhat.com/security/cve/CVE-2023-22114 REPORT
https://access.redhat.com/security/cve/CVE-2023-22115 REPORT
https://access.redhat.com/security/cve/CVE-2024-20960 REPORT
https://access.redhat.com/security/cve/CVE-2024-20961 REPORT
https://access.redhat.com/security/cve/CVE-2024-20962 REPORT
https://access.redhat.com/security/cve/CVE-2024-20963 REPORT
https://access.redhat.com/security/cve/CVE-2024-20964 REPORT
https://access.redhat.com/security/cve/CVE-2024-20965 REPORT
https://access.redhat.com/security/cve/CVE-2024-20966 REPORT
https://access.redhat.com/security/cve/CVE-2024-20967 REPORT
https://access.redhat.com/security/cve/CVE-2024-20968 REPORT
https://access.redhat.com/security/cve/CVE-2024-20969 REPORT
https://access.redhat.com/security/cve/CVE-2024-20970 REPORT
https://access.redhat.com/security/cve/CVE-2024-20971 REPORT
https://access.redhat.com/security/cve/CVE-2024-20972 REPORT
https://access.redhat.com/security/cve/CVE-2024-20973 REPORT
https://access.redhat.com/security/cve/CVE-2024-20974 REPORT
https://access.redhat.com/security/cve/CVE-2024-20976 REPORT
https://access.redhat.com/security/cve/CVE-2024-20977 REPORT
https://access.redhat.com/security/cve/CVE-2024-20978 REPORT
https://access.redhat.com/security/cve/CVE-2024-20981 REPORT
https://access.redhat.com/security/cve/CVE-2024-20982 REPORT
https://access.redhat.com/security/cve/CVE-2024-20983 REPORT
https://access.redhat.com/security/cve/CVE-2024-20984 REPORT
https://access.redhat.com/security/cve/CVE-2024-20985 REPORT
https://bugzilla.redhat.com/2179864 REPORT
https://bugzilla.redhat.com/2188109 REPORT
https://bugzilla.redhat.com/2188113 REPORT
https://bugzilla.redhat.com/2188115 REPORT
https://bugzilla.redhat.com/2188116 REPORT
https://bugzilla.redhat.com/2188117 REPORT
https://bugzilla.redhat.com/2188118 REPORT
https://bugzilla.redhat.com/2188119 REPORT
https://bugzilla.redhat.com/2188120 REPORT
https://bugzilla.redhat.com/2188121 REPORT
https://bugzilla.redhat.com/2188122 REPORT
https://bugzilla.redhat.com/2188123 REPORT
https://bugzilla.redhat.com/2188124 REPORT
https://bugzilla.redhat.com/2188125 REPORT
https://bugzilla.redhat.com/2188127 REPORT
https://bugzilla.redhat.com/2188128 REPORT
https://bugzilla.redhat.com/2188129 REPORT
https://bugzilla.redhat.com/2188130 REPORT
https://bugzilla.redhat.com/2188131 REPORT
https://bugzilla.redhat.com/2188132 REPORT
https://bugzilla.redhat.com/2224211 REPORT
https://bugzilla.redhat.com/2224212 REPORT
https://bugzilla.redhat.com/2224213 REPORT
https://bugzilla.redhat.com/2224214 REPORT
https://bugzilla.redhat.com/2224215 REPORT
https://bugzilla.redhat.com/2224216 REPORT
https://bugzilla.redhat.com/2224217 REPORT
https://bugzilla.redhat.com/2224218 REPORT
https://bugzilla.redhat.com/2224219 REPORT
https://bugzilla.redhat.com/2224220 REPORT
https://bugzilla.redhat.com/2224221 REPORT
https://bugzilla.redhat.com/2224222 REPORT
https://bugzilla.redhat.com/2245014 REPORT
https://bugzilla.redhat.com/2245015 REPORT
https://bugzilla.redhat.com/2245016 REPORT
https://bugzilla.redhat.com/2245017 REPORT
https://bugzilla.redhat.com/2245018 REPORT
https://bugzilla.redhat.com/2245019 REPORT
https://bugzilla.redhat.com/2245020 REPORT
https://bugzilla.redhat.com/2245021 REPORT
https://bugzilla.redhat.com/2245022 REPORT
https://bugzilla.redhat.com/2245023 REPORT
https://bugzilla.redhat.com/2245024 REPORT
https://bugzilla.redhat.com/2245026 REPORT
https://bugzilla.redhat.com/2245027 REPORT
https://bugzilla.redhat.com/2245028 REPORT
https://bugzilla.redhat.com/2245029 REPORT
https://bugzilla.redhat.com/2245030 REPORT
https://bugzilla.redhat.com/2245031 REPORT
https://bugzilla.redhat.com/2245032 REPORT
https://bugzilla.redhat.com/2245033 REPORT
https://bugzilla.redhat.com/2245034 REPORT
https://bugzilla.redhat.com/2258771 REPORT
https://bugzilla.redhat.com/2258772 REPORT
https://bugzilla.redhat.com/2258773 REPORT
https://bugzilla.redhat.com/2258774 REPORT
https://bugzilla.redhat.com/2258775 REPORT
https://bugzilla.redhat.com/2258776 REPORT
https://bugzilla.redhat.com/2258777 REPORT
https://bugzilla.redhat.com/2258778 REPORT
https://bugzilla.redhat.com/2258779 REPORT
https://bugzilla.redhat.com/2258780 REPORT
https://bugzilla.redhat.com/2258781 REPORT
https://bugzilla.redhat.com/2258782 REPORT
https://bugzilla.redhat.com/2258783 REPORT
https://bugzilla.redhat.com/2258784 REPORT
https://bugzilla.redhat.com/2258785 REPORT
https://bugzilla.redhat.com/2258787 REPORT
https://bugzilla.redhat.com/2258788 REPORT
https://bugzilla.redhat.com/2258789 REPORT
https://bugzilla.redhat.com/2258790 REPORT
https://bugzilla.redhat.com/2258791 REPORT
https://bugzilla.redhat.com/2258792 REPORT
https://bugzilla.redhat.com/2258793 REPORT
https://bugzilla.redhat.com/2258794 REPORT
https://errata.almalinux.org/9/ALSA-2024-1141.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.36-1.el9_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-common"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.36-1.el9_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.36-1.el9_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-errmsg"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.36-1.el9_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.36-1.el9_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-server"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.36-1.el9_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-test"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.36-1.el9_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nSecurity Fix(es):\n\n* mysql: InnoDB unspecified vulnerability (CPU Apr 2023) (CVE-2023-21911)\n* mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) (CVE-2023-21919, CVE-2023-21929, CVE-2023-21933)\n* mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) (CVE-2023-21920, CVE-2023-21935, CVE-2023-21945, CVE-2023-21946, CVE-2023-21976, CVE-2023-21977, CVE-2023-21982)\n* mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) (CVE-2023-21940, CVE-2023-21947, CVE-2023-21962)\n* mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) (CVE-2023-21953)\n* mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) (CVE-2023-21955)\n* mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) (CVE-2023-21966)\n* mysql: Server: DML unspecified vulnerability (CPU Apr 2023) (CVE-2023-21972)\n* mysql: Client programs unspecified vulnerability (CPU Apr 2023) (CVE-2023-21980)\n* mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) (CVE-2023-22005, CVE-2023-22007, CVE-2023-22057)\n* mysql: InnoDB unspecified vulnerability (CPU Jul 2023) (CVE-2023-22008)\n* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) (CVE-2023-22032, CVE-2023-22059, CVE-2023-22064, CVE-2023-22065, CVE-2023-22070, CVE-2023-22078, CVE-2023-22079, CVE-2023-22092, CVE-2023-22103, CVE-2023-22110, CVE-2023-22112)\n* mysql: InnoDB unspecified vulnerability (CPU Jul 2023) (CVE-2023-22033)\n* mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) (CVE-2023-22046)\n* mysql: Client programs unspecified vulnerability (CPU Jul 2023) (CVE-2023-22053, CVE-2023-22054, CVE-2023-22056)\n* mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) (CVE-2023-22058)\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2023) (CVE-2023-22066, CVE-2023-22068, CVE-2023-22084, CVE-2023-22097, CVE-2023-22104, CVE-2023-22114)\n* mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) (CVE-2023-22111)\n* mysql: Server: DML unspecified vulnerability (CPU Oct 2023) (CVE-2023-22115)\n* mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) (CVE-2024-20960)\n* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) (CVE-2024-20961, CVE-2024-20962, CVE-2024-20965, CVE-2024-20966, CVE-2024-2097, CVE-2024-20971, CVE-2024-20972, CVE-2024-20973, CVE-2024-20974, CVE-2024-20976, CVE-2024-20977, CVE-2024-20978, CVE-2024-20982)\n* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) (CVE-2024-20963)\n* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) (CVE-2024-20964)\n* mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) (CVE-2024-20967)\n* mysql: Server: Options unspecified vulnerability (CPU Jan 2024) (CVE-2024-20968)\n* mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) (CVE-2024-20969)\n* mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) (CVE-2024-20981)\n* mysql: Server: DML unspecified vulnerability (CPU Jan 2024) (CVE-2024-20983)\n* mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) (CVE-2024-20984)\n* mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) (CVE-2024-20985)\n* zstd: mysql: buffer overrun in util.c (CVE-2022-4899)\n* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) (CVE-2023-22038)\n* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) (CVE-2023-22048)\n* mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) (CVE-2023-22113)\n\nBug Fix(es):\n\n* Fix for MySQL bug #33630199 in 8.0.32 introduces regression when --set-gtid-purged=OFF (AlmaLinux-22454)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
  "id": "ALSA-2024:1141",
  "modified": "2024-03-07T19:03:22Z",
  "published": "2024-03-05T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2024:1141"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-4899"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21911"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21919"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21920"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21929"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21933"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21935"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21940"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21945"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21946"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21947"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21953"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21955"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21962"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21966"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21972"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21976"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21977"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21980"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-21982"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22005"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22007"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22008"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22032"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22033"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22038"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22046"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22048"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22053"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22054"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22056"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22057"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22058"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22059"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22064"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22065"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22066"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22068"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22070"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22078"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22079"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22084"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22092"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22097"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22103"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22104"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22110"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22111"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22112"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22113"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22114"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2023-22115"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20960"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20961"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20962"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20963"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20964"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20965"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20966"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20967"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20968"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20969"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20970"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20971"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20972"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20973"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20974"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20976"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20977"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20978"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20981"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20982"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20983"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20984"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-20985"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2179864"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188109"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188113"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188115"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188116"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188117"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188118"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188119"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188120"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188121"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188122"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188123"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188124"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188125"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188127"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188128"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188129"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188130"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188131"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2188132"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224211"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224212"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224213"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224214"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224215"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224216"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224217"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224218"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224219"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224220"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224221"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2224222"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245014"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245015"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245016"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245017"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245018"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245019"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245020"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245021"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245022"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245023"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245024"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245026"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245027"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245028"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245029"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245030"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245031"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245032"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245033"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2245034"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258771"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258772"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258773"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258774"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258775"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258776"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258777"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258778"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258779"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258780"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258781"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258782"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258783"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258784"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258785"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258787"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258788"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258789"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258790"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258791"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258792"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258793"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2258794"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/9/ALSA-2024-1141.html"
    }
  ],
  "related": [
    "CVE-2023-21911",
    "CVE-2023-21919",
    "CVE-2023-21929",
    "CVE-2023-21933",
    "CVE-2023-21920",
    "CVE-2023-21935",
    "CVE-2023-21945",
    "CVE-2023-21946",
    "CVE-2023-21976",
    "CVE-2023-21977",
    "CVE-2023-21982",
    "CVE-2023-21940",
    "CVE-2023-21947",
    "CVE-2023-21962",
    "CVE-2023-21953",
    "CVE-2023-21955",
    "CVE-2023-21966",
    "CVE-2023-21972",
    "CVE-2023-21980",
    "CVE-2023-22005",
    "CVE-2023-22007",
    "CVE-2023-22057",
    "CVE-2023-22008",
    "CVE-2023-22032",
    "CVE-2023-22059",
    "CVE-2023-22064",
    "CVE-2023-22065",
    "CVE-2023-22070",
    "CVE-2023-22078",
    "CVE-2023-22079",
    "CVE-2023-22092",
    "CVE-2023-22103",
    "CVE-2023-22110",
    "CVE-2023-22112",
    "CVE-2023-22033",
    "CVE-2023-22046",
    "CVE-2023-22053",
    "CVE-2023-22054",
    "CVE-2023-22056",
    "CVE-2023-22058",
    "CVE-2023-22066",
    "CVE-2023-22068",
    "CVE-2023-22084",
    "CVE-2023-22097",
    "CVE-2023-22104",
    "CVE-2023-22114",
    "CVE-2023-22111",
    "CVE-2023-22115",
    "CVE-2024-20960",
    "CVE-2024-20961",
    "CVE-2024-20962",
    "CVE-2024-20965",
    "CVE-2024-20966",
    "CVE-2024-2097",
    "CVE-2024-20971",
    "CVE-2024-20972",
    "CVE-2024-20973",
    "CVE-2024-20974",
    "CVE-2024-20976",
    "CVE-2024-20977",
    "CVE-2024-20978",
    "CVE-2024-20982",
    "CVE-2024-20963",
    "CVE-2024-20964",
    "CVE-2024-20967",
    "CVE-2024-20968",
    "CVE-2024-20969",
    "CVE-2024-20981",
    "CVE-2024-20983",
    "CVE-2024-20984",
    "CVE-2024-20985",
    "CVE-2022-4899",
    "CVE-2023-22038",
    "CVE-2023-22048",
    "CVE-2023-22113"
  ],
  "summary": "Moderate: mysql security update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…