[RHSA-2022:7119] mysql:8.0 security, bug fix, and enhancement update
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30).
Security Fix(es):
mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413)
mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265)
mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415)
mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596)
mysql: C API unspecified vulnerability (CVE-2021-35597)
mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515)
mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423)
mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454)
mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538)
mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625)
mysql: Server: GIS unspecified vulnerability (CVE-2021-35631)
mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632)
mysql: Server: PS unspecified vulnerability (CVE-2021-35637)
mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534)
mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427)
mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547)
mysql: Server: Parser unspecified vulnerability (CVE-2022-21304)
mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374)
mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367)
mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368)
mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249)
mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457)
mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633)
mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) rhel-8
- ID
- RHSA-2022:7119
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2022:7119
- Published
-
2022-10-25T00:00:00
(23 months ago) - Modified
-
2022-10-25T00:00:00
(23 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALPINE:CVE-2021-35604
- ALPINE:CVE-2022-21427
- ALSA-2022:1556
- ALSA-2022:1557
- ALSA-2022:6443
- ALSA-2022:6590
- ALSA-2022:7119
- ELSA-2022-1556
- ELSA-2022-1557
- ELSA-2022-6443
- ELSA-2022-6590
- ELSA-2022-7119
- FEDORA-2021-46dc82116b
- FEDORA-2021-70dd0b9f5d
- FEDORA-2021-72d5918529
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-f74148c6d4
- FEDORA-2022-43217f0ba7
- FEDORA-2022-7197cef91f
- FEDORA-2022-9178229cd7
- FEDORA-2022-be015e0331
- FREEBSD:4B9C1C17-587C-11ED-856E-D4C9EF517024
- FREEBSD:7262F826-795E-11EC-8BE6-D4C9EF517024
- FREEBSD:759A5599-3CE8-11EE-A0D1-84A93843EB75
- FREEBSD:8E150606-08C9-11ED-856E-D4C9EF517024
- FREEBSD:ADD683BE-BD76-11EC-A06F-D4C9EF517024
- FREEBSD:C9387E4D-2F5F-11EC-8BE6-D4C9EF517024
- FREEBSD:DC49F6DC-99D2-11ED-86E9-D4C9EF517024
- MS:CVE-2021-2478
- MS:CVE-2021-2479
- MS:CVE-2021-2481
- MS:CVE-2021-35546
- MS:CVE-2021-35575
- MS:CVE-2021-35577
- MS:CVE-2021-35591
- MS:CVE-2021-35596
- MS:CVE-2021-35597
- MS:CVE-2021-35602
- MS:CVE-2021-35607
- MS:CVE-2021-35608
- MS:CVE-2021-35610
- MS:CVE-2021-35612
- MS:CVE-2021-35622
- MS:CVE-2021-35623
- MS:CVE-2021-35624
- MS:CVE-2021-35625
- MS:CVE-2021-35626
- MS:CVE-2021-35627
- MS:CVE-2021-35628
- MS:CVE-2021-35630
- MS:CVE-2021-35631
- MS:CVE-2021-35632
- MS:CVE-2021-35633
- MS:CVE-2021-35634
- MS:CVE-2021-35635
- MS:CVE-2021-35636
- MS:CVE-2021-35637
- MS:CVE-2021-35638
- MS:CVE-2021-35640
- MS:CVE-2021-35641
- MS:CVE-2021-35642
- MS:CVE-2021-35643
- MS:CVE-2021-35644
- MS:CVE-2021-35645
- MS:CVE-2021-35646
- MS:CVE-2021-35647
- MS:CVE-2021-35648
- MS:CVE-2022-21245
- MS:CVE-2022-21249
- MS:CVE-2022-21253
- MS:CVE-2022-21254
- MS:CVE-2022-21256
- MS:CVE-2022-21264
- MS:CVE-2022-21265
- MS:CVE-2022-21270
- MS:CVE-2022-21278
- MS:CVE-2022-21297
- MS:CVE-2022-21301
- MS:CVE-2022-21302
- MS:CVE-2022-21303
- MS:CVE-2022-21304
- MS:CVE-2022-21339
- MS:CVE-2022-21342
- MS:CVE-2022-21344
- MS:CVE-2022-21348
- MS:CVE-2022-21351
- MS:CVE-2022-21352
- MS:CVE-2022-21358
- MS:CVE-2022-21362
- MS:CVE-2022-21367
- MS:CVE-2022-21368
- MS:CVE-2022-21370
- MS:CVE-2022-21372
- MS:CVE-2022-21374
- MS:CVE-2022-21378
- MS:CVE-2022-21412
- MS:CVE-2022-21417
- MS:CVE-2022-21425
- MS:CVE-2022-21427
- MS:CVE-2022-21444
- MS:CVE-2022-21451
- MS:CVE-2022-21454
- MS:CVE-2022-21460
- MS:CVE-2022-21478
- MS:CVE-2022-21479
- MS:CVE-2022-21592
- MS:CVE-2022-21635
- MS:CVE-2022-21638
- MS:CVE-2022-21641
- openSUSE-SU-2021:3835-1
- RHSA-2022:1556
- RHSA-2022:1557
- RHSA-2022:5826
- RHSA-2022:5948
- RHSA-2022:6443
- RHSA-2022:6590
- RLSA-2022:1556
- RLSA-2022:1557
- RLSA-2022:5826
- RLSA-2022:5948
- RLSA-2022:6443
- RLSA-2022:6590
- RLSA-2022:7119
- SUSE-SU-2021:3835-1
- SUSE-SU-2021:3836-1
- SUSE-SU-2021:3948-1
- SUSE-SU-2021:4202-1
- SUSE-SU-2022:2003-1
- SUSE-SU-2022:2107-1
- SUSE-SU-2022:2160-1
- SUSE-SU-2022:2189-1
- SUSE-SU-2023:0631-1
- USN-5123-1
- USN-5123-2
- USN-5170-1
- USN-5270-1
- USN-5270-2
- USN-5400-1
- USN-5400-2
- USN-5537-1
- USN-5537-2
- USN-5696-1
- USN-5696-2
- USN-5739-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/mysql?arch=x86_64&distro=redhat-8.6 | redhat | mysql | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/mysql?arch=s390x&distro=redhat-8.6 | redhat | mysql | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/mysql?arch=ppc64le&distro=redhat-8.6 | redhat | mysql | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/mysql?arch=aarch64&distro=redhat-8.6 | redhat | mysql | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/mysql-test?arch=x86_64&distro=redhat-8.6 | redhat | mysql-test | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/mysql-test?arch=s390x&distro=redhat-8.6 | redhat | mysql-test | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/mysql-test?arch=ppc64le&distro=redhat-8.6 | redhat | mysql-test | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/mysql-test?arch=aarch64&distro=redhat-8.6 | redhat | mysql-test | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/mysql-server?arch=x86_64&distro=redhat-8.6 | redhat | mysql-server | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/mysql-server?arch=s390x&distro=redhat-8.6 | redhat | mysql-server | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/mysql-server?arch=ppc64le&distro=redhat-8.6 | redhat | mysql-server | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/mysql-server?arch=aarch64&distro=redhat-8.6 | redhat | mysql-server | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/mysql-libs?arch=x86_64&distro=redhat-8.6 | redhat | mysql-libs | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/mysql-libs?arch=s390x&distro=redhat-8.6 | redhat | mysql-libs | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/mysql-libs?arch=ppc64le&distro=redhat-8.6 | redhat | mysql-libs | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/mysql-libs?arch=aarch64&distro=redhat-8.6 | redhat | mysql-libs | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/mysql-errmsg?arch=x86_64&distro=redhat-8.6 | redhat | mysql-errmsg | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/mysql-errmsg?arch=s390x&distro=redhat-8.6 | redhat | mysql-errmsg | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/mysql-errmsg?arch=ppc64le&distro=redhat-8.6 | redhat | mysql-errmsg | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/mysql-errmsg?arch=aarch64&distro=redhat-8.6 | redhat | mysql-errmsg | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/mysql-devel?arch=x86_64&distro=redhat-8.6 | redhat | mysql-devel | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/mysql-devel?arch=s390x&distro=redhat-8.6 | redhat | mysql-devel | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/mysql-devel?arch=ppc64le&distro=redhat-8.6 | redhat | mysql-devel | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/mysql-devel?arch=aarch64&distro=redhat-8.6 | redhat | mysql-devel | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/mysql-common?arch=x86_64&distro=redhat-8.6 | redhat | mysql-common | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/mysql-common?arch=s390x&distro=redhat-8.6 | redhat | mysql-common | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/mysql-common?arch=ppc64le&distro=redhat-8.6 | redhat | mysql-common | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/mysql-common?arch=aarch64&distro=redhat-8.6 | redhat | mysql-common | < 8.0.30-1.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/mecab?arch=x86_64&distro=redhat-8.6 | redhat | mecab | < 0.996-2.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/mecab?arch=s390x&distro=redhat-8.6 | redhat | mecab | < 0.996-2.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/mecab?arch=ppc64le&distro=redhat-8.6 | redhat | mecab | < 0.996-2.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/mecab?arch=aarch64&distro=redhat-8.6 | redhat | mecab | < 0.996-2.module+el8.6.0+16523+5cb0e868 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/mecab-ipadic?arch=x86_64&distro=redhat-8.0 | redhat | mecab-ipadic | < 2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de | redhat-8.0 | x86_64 | |
Affected | pkg:rpm/redhat/mecab-ipadic?arch=s390x&distro=redhat-8.0 | redhat | mecab-ipadic | < 2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de | redhat-8.0 | s390x | |
Affected | pkg:rpm/redhat/mecab-ipadic?arch=ppc64le&distro=redhat-8.0 | redhat | mecab-ipadic | < 2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de | redhat-8.0 | ppc64le | |
Affected | pkg:rpm/redhat/mecab-ipadic?arch=aarch64&distro=redhat-8.0 | redhat | mecab-ipadic | < 2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de | redhat-8.0 | aarch64 | |
Affected | pkg:rpm/redhat/mecab-ipadic-EUCJP?arch=x86_64&distro=redhat-8.0 | redhat | mecab-ipadic-EUCJP | < 2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de | redhat-8.0 | x86_64 | |
Affected | pkg:rpm/redhat/mecab-ipadic-EUCJP?arch=s390x&distro=redhat-8.0 | redhat | mecab-ipadic-EUCJP | < 2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de | redhat-8.0 | s390x | |
Affected | pkg:rpm/redhat/mecab-ipadic-EUCJP?arch=ppc64le&distro=redhat-8.0 | redhat | mecab-ipadic-EUCJP | < 2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de | redhat-8.0 | ppc64le | |
Affected | pkg:rpm/redhat/mecab-ipadic-EUCJP?arch=aarch64&distro=redhat-8.0 | redhat | mecab-ipadic-EUCJP | < 2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de | redhat-8.0 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |