First published: Wed Jan 16 2019(Updated: )
Last updated 24 July 2024
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.6.43 | 5.6.43 |
redhat/mysql | <5.7.25 | 5.7.25 |
redhat/mysql | <8.0.14 | 8.0.14 |
redhat/mariadb | <5.5.63 | 5.5.63 |
redhat/mariadb | <10.1.38 | 10.1.38 |
redhat/mariadb | <10.0.38 | 10.0.38 |
debian/mariadb-10.0 | ||
debian/mysql-5.7 | ||
Oracle MySQL | >=5.6.0<=5.6.42 | |
Oracle MySQL | >=5.7.0<=5.7.24 | |
Oracle MySQL | >=8.0.0<=8.0.13 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Netapp Oncommand Unified Manager Windows | >=7.3 | |
Netapp Oncommand Unified Manager Vsphere | >=9.4 | |
NetApp OnCommand Workflow Automation | ||
Netapp Snapcenter | ||
Netapp Storage Automation Store | ||
Mariadb Mariadb | >=5.5.0<5.5.63 | |
Mariadb Mariadb | >=10.0.0<10.0.38 | |
Mariadb Mariadb | >=10.1.0<10.1.38 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Desktop | =8.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server | =8.0 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.6 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Redhat Enterprise Linux Workstation | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-2529 is medium (6.5).
Versions 5.6.42 and prior, 5.7.24 and prior, and 8.0.13 and prior of MySQL Server are affected by CVE-2019-2529.
A low privileged attacker with network access via multiple protocols can easily exploit CVE-2019-2529.
The remedy for CVE-2019-2529 is to upgrade to the fixed versions available from the vendor.
You can find more information about CVE-2019-2529 at the following references: [http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html), [http://www.securityfocus.com/bid/106619](http://www.securityfocus.com/bid/106619), [https://security.netapp.com/advisory/ntap-20190118-0002/](https://security.netapp.com/advisory/ntap-20190118-0002/).