First published: Wed Jan 16 2019(Updated: )
Last updated 24 July 2024
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mysql-5.7 | ||
redhat/mysql | <5.7.25 | 5.7.25 |
redhat/mysql | <8.0.14 | 8.0.14 |
MySQL | >=5.7.0<=5.7.24 | |
MySQL | >=8.0.0<=8.0.13 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
NetApp OnCommand Unified Manager for Windows | >=7.3 | |
NetApp OnCommand Unified Manager for vSphere | >=9.4 | |
NetApp OnCommand Workflow Automation | ||
NetApp SnapCenter | ||
NetApp Storage Automation Store | ||
redhat software collections | =1.0 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux eus | =8.6 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server aus | =8.6 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server tus | =8.6 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-2420.
The versions of Oracle MySQL affected by this vulnerability are 5.7.24 and prior, and 8.0.13 and prior.
An attacker with high privileges and network access via multiple protocols can easily exploit this vulnerability.
The severity level of this vulnerability is medium with a severity value of 4.9.
You can find more information about this vulnerability at the following references: [Oracle Security Advisory](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html), [Red Hat Bugzilla - CVE-2019-2420](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1666776), [Red Hat Bugzilla - CVE-2019-2420](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1666778).