First published: Tue Jul 19 2022(Updated: )
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.7.39 | 5.7.39 |
redhat/mysql | <8.0.30 | 8.0.30 |
Oracle Mysql Server | <=5.7.38 | |
Oracle Mysql Server | >=8.0.0<=8.0.29 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
Netapp Snapcenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this MySQL Server vulnerability is CVE-2022-21515.
This vulnerability affects the Server: Options component of Oracle MySQL.
Versions 5.7.38 and prior, as well as 8.0.29 and prior, are affected by this vulnerability.
This vulnerability has a severity level of medium, with a CVSS score of 4.9.
An attacker with high privileges and network access via multiple protocols can exploit this vulnerability to compromise MySQL Server.
Yes, Redhat has released patches for this vulnerability. For version 5.7.38, apply the remedy version 5.7.39, and for version 8.0.29, apply the remedy version 8.0.30.
You can find more information about this vulnerability at the following references: [Reference 1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/), [Reference 3](https://security.netapp.com/advisory/ntap-20220729-0004/).