First published: Tue Apr 23 2019(Updated: )
Last updated 24 July 2024
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.7.26 | 5.7.26 |
redhat/mysql | <8.0.16 | 8.0.16 |
redhat/mariadb | <10.4.5 | 10.4.5 |
redhat/mariadb | <10.3.15 | 10.3.15 |
redhat/mariadb | <10.2.24 | 10.2.24 |
debian/mariadb-10.3 | ||
debian/mysql-5.7 | ||
Oracle MySQL | >=5.7.0<=5.7.25 | |
Oracle MySQL | >=8.0.0<=8.0.15 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
MariaDB | >=10.2.0<10.2.24 | |
MariaDB | >=10.3.0<10.3.15 | |
MariaDB | >=10.4.0<10.4.5 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server EUS | =8.6 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2628 is classified as an easily exploitable vulnerability that allows high privileged attackers to gain unauthorized access.
You can resolve CVE-2019-2628 by upgrading MySQL to version 5.7.26 or later, or 8.0.16 or later.
The affected versions for CVE-2019-2628 are MySQL 5.7.25 and earlier, and MySQL 8.0.15 and earlier.
Yes, CVE-2019-2628 can be exploited remotely, requiring only network access via multiple protocols.
If exploited, CVE-2019-2628 allows an attacker to execute unauthorized operations on the database server.