[FREEBSD:C9387E4D-2F5F-11EC-8BE6-D4C9EF517024] MySQL -- Multiple vulnerabilities
Severity
Critical
Affected Packages
7
CVEs
58
Oracle reports:
This Critical Patch Update contains 66 new security patches for
Oracle MySQL. 8 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.
The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle
MySQL is 9.8.
Note: MariaDB only vulnerable against CVE-2021-35604
Package | Affected Version |
---|---|
pkg:freebsd/mysql80-server | < 8.0.27 |
pkg:freebsd/mysql80-client | < 8.0.27 |
pkg:freebsd/mysql57-server | < 5.7.36 |
pkg:freebsd/mysql-connector-java | < 8.0.27 |
pkg:freebsd/mariadb105-server | < 10.5.13 |
pkg:freebsd/mariadb104-server | < 10.4.22 |
pkg:freebsd/mariadb103-server | < 10.3.32 |
- ID
- FREEBSD:C9387E4D-2F5F-11EC-8BE6-D4C9EF517024
- Severity
- critical
- Severity from
- CVE-2021-22931
- URL
- http://vuxml.freebsd.org/freebsd/c9387e4d-2f5f-11ec-8be6-d4c9ef517024.html
- Published
-
2021-10-16T00:00:00
(2 years ago) - Modified
-
2021-10-17T00:00:00
(2 years ago) - Rights
- FreeBSD VuXML Security Team
- Other Advisories
-
- ALPINE:CVE-2021-22926
- ALPINE:CVE-2021-22931
- ALPINE:CVE-2021-35604
- ALPINE:CVE-2021-36222
- ALPINE:CVE-2021-3711
- ALSA-2021:3576
- ALSA-2021:3590
- ALSA-2021:3623
- ALSA-2021:3666
- ALSA-2022:1556
- ALSA-2022:1557
- ALSA-2022:7119
- CURL-CVE-2021-22926
- DSA-4944-1
- DSA-4963-1
- ELSA-2021-3576
- ELSA-2021-3623
- ELSA-2021-3666
- ELSA-2022-1556
- ELSA-2022-1557
- ELSA-2022-7119
- FEDORA-2021-2bae525fd3
- FEDORA-2021-46dc82116b
- FEDORA-2021-70dd0b9f5d
- FEDORA-2021-72d5918529
- FEDORA-2021-8b25e4642f
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-f74148c6d4
- FREEBSD:96811D4A-04EC-11EC-9B84-D4C9EF517024
- FREEBSD:AA646C01-EA0D-11EB-9B84-D4C9EF517024
- FREEBSD:B092BD4F-1B16-11EC-9D9D-0022489AD614
- GLSA-202209-02
- GLSA-202210-02
- GLSA-202212-01
- GLSA-202401-02
- GLSA-202405-11
- GLSA-202405-29
- MAVEN:GHSA-W6F2-8WX4-47R5
- MS:CVE-2021-2471
- MS:CVE-2021-2478
- MS:CVE-2021-2479
- MS:CVE-2021-2481
- MS:CVE-2021-35537
- MS:CVE-2021-35546
- MS:CVE-2021-35575
- MS:CVE-2021-35577
- MS:CVE-2021-35591
- MS:CVE-2021-35596
- MS:CVE-2021-35597
- MS:CVE-2021-35602
- MS:CVE-2021-35607
- MS:CVE-2021-35608
- MS:CVE-2021-35610
- MS:CVE-2021-35612
- MS:CVE-2021-35618
- MS:CVE-2021-35621
- MS:CVE-2021-35622
- MS:CVE-2021-35623
- MS:CVE-2021-35624
- MS:CVE-2021-35625
- MS:CVE-2021-35626
- MS:CVE-2021-35627
- MS:CVE-2021-35628
- MS:CVE-2021-35629
- MS:CVE-2021-35630
- MS:CVE-2021-35631
- MS:CVE-2021-35632
- MS:CVE-2021-35633
- MS:CVE-2021-35634
- MS:CVE-2021-35635
- MS:CVE-2021-35636
- MS:CVE-2021-35637
- MS:CVE-2021-35638
- MS:CVE-2021-35640
- MS:CVE-2021-35641
- MS:CVE-2021-35642
- MS:CVE-2021-35643
- MS:CVE-2021-35644
- MS:CVE-2021-35645
- MS:CVE-2021-35646
- MS:CVE-2021-35647
- MS:CVE-2021-35648
- MS:CVE-2021-36222
- MS:CVE-2021-3711
- openSUSE-SU-2021:1182-1
- openSUSE-SU-2021:1188-1
- openSUSE-SU-2021:1214-1
- openSUSE-SU-2021:1239-1
- openSUSE-SU-2021:1313-1
- openSUSE-SU-2021:2800-1
- openSUSE-SU-2021:2830-1
- openSUSE-SU-2021:2875-1
- openSUSE-SU-2021:2953-1
- openSUSE-SU-2021:3211-1
- openSUSE-SU-2021:3835-1
- openSUSE-SU-2022:0283-1
- openSUSE-SU-2022:0658-1
- RHSA-2021:3576
- RHSA-2021:3590
- RHSA-2021:3623
- RHSA-2021:3666
- RHSA-2022:1556
- RHSA-2022:1557
- RHSA-2022:7119
- RLSA-2021:3590
- RLSA-2021:3623
- RLSA-2021:3666
- RLSA-2022:1556
- RLSA-2022:1557
- RLSA-2022:7119
- RUSTSEC-2021-0097
- SECADV-20210824-1
- SSA:2021-202-02
- SUSE-SU-2021:2800-1
- SUSE-SU-2021:2823-1
- SUSE-SU-2021:2824-1
- SUSE-SU-2021:2830-1
- SUSE-SU-2021:2833-1
- SUSE-SU-2021:2875-1
- SUSE-SU-2021:2953-1
- SUSE-SU-2021:3184-1
- SUSE-SU-2021:3211-1
- SUSE-SU-2021:3835-1
- SUSE-SU-2021:3836-1
- SUSE-SU-2021:3948-1
- SUSE-SU-2021:4202-1
- SUSE-SU-2022:0283-1
- SUSE-SU-2022:0751-1
- SUSE-SU-2022:1142-1
- SUSE-SU-2022:1396-1
- SUSE-SU-2022:2134-1
- SUSE-SU-2022:3676-1
- SUSE-SU-2022:4428-1
- SUSE-SU-2022:4437-1
- SUSE-SU-2022:4439-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- USN-5051-1
- USN-5123-1
- USN-5123-2
- USN-5170-1
- USN-5959-1
Source | # ID | Name | URL |
---|---|---|---|
FreeBSD VuXML | https://www.oracle.com/security-alerts/cpuoct2021.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:freebsd/mysql80-server | mysql80-server | < 8.0.27 | ||||
Affected | pkg:freebsd/mysql80-client | mysql80-client | < 8.0.27 | ||||
Affected | pkg:freebsd/mysql57-server | mysql57-server | < 5.7.36 | ||||
Affected | pkg:freebsd/mysql-connector-java | mysql-connector-java | < 8.0.27 | ||||
Affected | pkg:freebsd/mariadb105-server | mariadb105-server | < 10.5.13 | ||||
Affected | pkg:freebsd/mariadb104-server | mariadb104-server | < 10.4.22 | ||||
Affected | pkg:freebsd/mariadb103-server | mariadb103-server | < 10.3.32 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |