{ "Definition": [ { "ID": "oval:org.altlinux.errata:def:20223102", "Version": "oval:org.altlinux.errata:def:20223102", "Class": "patch", "Metadata": { "Title": "ALT-PU-2022-3102: package `MySQL` update to version 8.0.30-alt1.1", "AffectedList": [ { "Family": "unix", "Platforms": [ "ALT Linux branch c10f1" ], "Products": [ "ALT SP Workstation", "ALT SP Server" ] } ], "References": [ { "RefID": "ALT-PU-2022-3102", "RefURL": "https://errata.altlinux.org/ALT-PU-2022-3102", "Source": "ALTPU" }, { "RefID": "BDU:2022-00760", "RefURL": "https://bdu.fstec.ru/vul/2022-00760", "Source": "BDU" }, { "RefID": "BDU:2022-01641", "RefURL": "https://bdu.fstec.ru/vul/2022-01641", "Source": "BDU" }, { "RefID": "BDU:2022-03177", "RefURL": "https://bdu.fstec.ru/vul/2022-03177", "Source": "BDU" }, { "RefID": "BDU:2022-03181", "RefURL": "https://bdu.fstec.ru/vul/2022-03181", "Source": "BDU" }, { "RefID": "BDU:2022-04518", "RefURL": "https://bdu.fstec.ru/vul/2022-04518", "Source": "BDU" }, { "RefID": "BDU:2022-04519", "RefURL": "https://bdu.fstec.ru/vul/2022-04519", "Source": "BDU" }, { "RefID": "BDU:2022-04520", "RefURL": "https://bdu.fstec.ru/vul/2022-04520", "Source": "BDU" }, { "RefID": "BDU:2022-04521", "RefURL": "https://bdu.fstec.ru/vul/2022-04521", "Source": "BDU" }, { "RefID": "BDU:2022-04522", "RefURL": "https://bdu.fstec.ru/vul/2022-04522", "Source": "BDU" }, { "RefID": "BDU:2022-04523", "RefURL": "https://bdu.fstec.ru/vul/2022-04523", "Source": "BDU" }, { "RefID": "BDU:2022-04524", "RefURL": "https://bdu.fstec.ru/vul/2022-04524", "Source": "BDU" }, { "RefID": "BDU:2022-04525", "RefURL": "https://bdu.fstec.ru/vul/2022-04525", "Source": "BDU" }, { "RefID": "BDU:2022-04526", "RefURL": "https://bdu.fstec.ru/vul/2022-04526", "Source": "BDU" }, { "RefID": "BDU:2022-04561", "RefURL": "https://bdu.fstec.ru/vul/2022-04561", "Source": "BDU" }, { "RefID": "BDU:2022-04562", "RefURL": "https://bdu.fstec.ru/vul/2022-04562", "Source": "BDU" }, { "RefID": "BDU:2022-04563", "RefURL": "https://bdu.fstec.ru/vul/2022-04563", "Source": "BDU" }, { "RefID": "BDU:2022-04564", "RefURL": "https://bdu.fstec.ru/vul/2022-04564", "Source": "BDU" }, { "RefID": "BDU:2022-04566", "RefURL": "https://bdu.fstec.ru/vul/2022-04566", "Source": "BDU" }, { "RefID": "BDU:2022-04567", "RefURL": "https://bdu.fstec.ru/vul/2022-04567", "Source": "BDU" }, { "RefID": "BDU:2022-04568", "RefURL": "https://bdu.fstec.ru/vul/2022-04568", "Source": "BDU" }, { "RefID": "BDU:2022-04571", "RefURL": "https://bdu.fstec.ru/vul/2022-04571", "Source": "BDU" }, { "RefID": "BDU:2022-04579", "RefURL": "https://bdu.fstec.ru/vul/2022-04579", "Source": "BDU" }, { "RefID": "BDU:2022-04634", "RefURL": "https://bdu.fstec.ru/vul/2022-04634", "Source": "BDU" }, { "RefID": "BDU:2022-04635", "RefURL": "https://bdu.fstec.ru/vul/2022-04635", "Source": "BDU" }, { "RefID": "BDU:2022-04636", "RefURL": "https://bdu.fstec.ru/vul/2022-04636", "Source": "BDU" }, { "RefID": "BDU:2022-06416", "RefURL": "https://bdu.fstec.ru/vul/2022-06416", "Source": "BDU" }, { "RefID": "BDU:2022-06418", "RefURL": "https://bdu.fstec.ru/vul/2022-06418", "Source": "BDU" }, { "RefID": "BDU:2022-06423", "RefURL": "https://bdu.fstec.ru/vul/2022-06423", "Source": "BDU" }, { "RefID": "BDU:2022-06425", "RefURL": "https://bdu.fstec.ru/vul/2022-06425", "Source": "BDU" }, { "RefID": "BDU:2023-00414", "RefURL": "https://bdu.fstec.ru/vul/2023-00414", "Source": "BDU" }, { "RefID": "CVE-2018-25032", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032", "Source": "CVE" }, { "RefID": "CVE-2022-1292", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1292", "Source": "CVE" }, { "RefID": "CVE-2022-21455", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21455", "Source": "CVE" }, { "RefID": "CVE-2022-21509", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21509", "Source": "CVE" }, { "RefID": "CVE-2022-21515", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21515", "Source": "CVE" }, { "RefID": "CVE-2022-21517", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21517", "Source": "CVE" }, { "RefID": "CVE-2022-21522", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21522", "Source": "CVE" }, { "RefID": "CVE-2022-21525", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21525", "Source": "CVE" }, { "RefID": "CVE-2022-21526", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21526", "Source": "CVE" }, { "RefID": "CVE-2022-21527", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21527", "Source": "CVE" }, { "RefID": "CVE-2022-21528", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21528", "Source": "CVE" }, { "RefID": "CVE-2022-21529", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21529", "Source": "CVE" }, { "RefID": "CVE-2022-21530", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21530", "Source": "CVE" }, { "RefID": "CVE-2022-21531", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21531", "Source": "CVE" }, { "RefID": "CVE-2022-21534", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21534", "Source": "CVE" }, { "RefID": "CVE-2022-21535", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21535", "Source": "CVE" }, { "RefID": "CVE-2022-21537", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21537", "Source": "CVE" }, { "RefID": "CVE-2022-21538", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21538", "Source": "CVE" }, { "RefID": "CVE-2022-21539", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21539", "Source": "CVE" }, { "RefID": "CVE-2022-21547", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21547", "Source": "CVE" }, { "RefID": "CVE-2022-21553", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21553", "Source": "CVE" }, { "RefID": "CVE-2022-21556", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21556", "Source": "CVE" }, { "RefID": "CVE-2022-21569", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21569", "Source": "CVE" }, { "RefID": "CVE-2022-21592", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21592", "Source": "CVE" }, { "RefID": "CVE-2022-21635", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21635", "Source": "CVE" }, { "RefID": "CVE-2022-21638", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21638", "Source": "CVE" }, { "RefID": "CVE-2022-21641", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21641", "Source": "CVE" }, { "RefID": "CVE-2022-21824", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", "Source": "CVE" }, { "RefID": "CVE-2022-27778", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27778", "Source": "CVE" }, { "RefID": "CVE-2023-21872", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-21872", "Source": "CVE" } ], "Description": "This update upgrades MySQL to version 8.0.30-alt1.1. \nSecurity Fix(es):\n\n * BDU:2022-00760: Уязвимость реализации функции console.table() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании или обойти ограничения безопасности\n\n * BDU:2022-01641: Уязвимость библиотеки zlib, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03177: Уязвимость реализации конфигурации —no-clobber и --remove-on-error утилиты командной строки cURL, позволяющая нарушителю удалить произвольные файлы\n\n * BDU:2022-03181: Уязвимость реализации сценария c_rehash библиотеки OpenSSL, позволяющая нарушителю выполнять произвольные команды\n\n * BDU:2022-04518: Уязвимость компонента Server: PAM Auth Plugin системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных\n\n * BDU:2022-04519: Уязвимость компонента Server: Options системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04520: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04521: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04522: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2022-04523: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2022-04524: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2022-04525: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04526: Уязвимость компонента Server: Stored Procedure системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04561: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04562: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04563: Уязвимость компонента Server: Stored Procedure системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04564: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ на чтение, изменение или удаление данных\n\n * BDU:2022-04566: Уязвимость компонента Server: Security: Encryption системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04567: Уязвимость компонента Server: Federated системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04568: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04571: Уязвимость компонента Shell: General/Core Client клиента командной строки и редактора кода Oracle MySQL Shell, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04579: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании\n\n * BDU:2022-04634: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04635: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04636: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06416: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06418: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06423: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2022-06425: Уязвимость компонента Server: Security: Encryption системы управления базами данных MySQL Server, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2023-00414: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных или вызвать отказ в обслуживании\n\n * CVE-2018-25032: zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n\n * CVE-2022-1292: The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).\n\n * CVE-2022-21455: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).\n\n * CVE-2022-21509: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2022-21515: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21517: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21522: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21525: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21526: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21527: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2022-21528: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2022-21529: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21530: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21531: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21534: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21535: Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: General/Core Client). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Shell. CVSS 3.1 Base Score 2.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).\n\n * CVE-2022-21537: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21538: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).\n\n * CVE-2022-21539: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L).\n\n * CVE-2022-21547: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21553: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21556: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).\n\n * CVE-2022-21569: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21592: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2022-21635: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).\n\n * CVE-2022-21638: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21641: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2022-21824: Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js \u003e= 12.22.9, \u003e= 14.18.3, \u003e= 16.13.2, and \u003e= 17.3.1 use a null protoype for the object these properties are being assigned to.\n\n * CVE-2022-27778: A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.\n\n * CVE-2023-21872: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "Advisory": { "From": "errata.altlinux.org", "Severity": "Critical", "Rights": "Copyright 2024 BaseALT Ltd.", "Issued": { "Date": "2022-11-17" }, "Updated": { "Date": "2022-11-17" }, "BDUs": [ { "ID": "BDU:2022-00760", "CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "CWE": "CWE-94, CWE-915, CWE-1321", "Href": "https://bdu.fstec.ru/vul/2022-00760", "Impact": "Low", "Public": "20210820" }, { "ID": "BDU:2022-01641", "CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C", "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "CWE": "CWE-119, CWE-787", "Href": "https://bdu.fstec.ru/vul/2022-01641", "Impact": "High", "Public": "20220323" }, { "ID": "BDU:2022-03177", "CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "CWE": "CWE-664, CWE-706, CWE-763", "Href": "https://bdu.fstec.ru/vul/2022-03177", "Impact": "Low", "Public": "20220428" }, { "ID": "BDU:2022-03181", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-77, CWE-78", "Href": "https://bdu.fstec.ru/vul/2022-03181", "Impact": "High", "Public": "20220402" }, { "ID": "BDU:2022-04518", "CVSS": "AV:N/AC:L/Au:S/C:N/I:C/A:N", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04518", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04519", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04519", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04520", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04520", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04521", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04521", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04522", "CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04522", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04523", "CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04523", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04524", "CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04524", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04525", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04525", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04526", "CVSS": "AV:N/AC:H/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-04526", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04561", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04561", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04562", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04562", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04563", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04563", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04564", "CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "CWE": "CWE-264, CWE-269", "Href": "https://bdu.fstec.ru/vul/2022-04564", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04566", "CVSS": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04566", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04567", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04567", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04568", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04568", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04571", "CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "CVSS3": "AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04571", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04579", "CVSS": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "CWE": "CWE-264, CWE-269", "Href": "https://bdu.fstec.ru/vul/2022-04579", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04634", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04634", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04635", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04635", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-04636", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-404", "Href": "https://bdu.fstec.ru/vul/2022-04636", "Impact": "Low", "Public": "20220719" }, { "ID": "BDU:2022-06416", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-06416", "Impact": "Low", "Public": "20221018" }, { "ID": "BDU:2022-06418", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-06418", "Impact": "Low", "Public": "20221018" }, { "ID": "BDU:2022-06423", "CVSS": "AV:N/AC:L/Au:S/C:N/I:C/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-06423", "Impact": "Low", "Public": "20221018" }, { "ID": "BDU:2022-06425", "CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2022-06425", "Impact": "Low", "Public": "20221018" }, { "ID": "BDU:2023-00414", "CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2023-00414", "Impact": "Low", "Public": "20230117" } ], "CVEs": [ { "ID": "CVE-2018-25032", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-787", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032", "Impact": "High", "Public": "20220325" }, { "ID": "CVE-2022-1292", "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-78", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1292", "Impact": "Critical", "Public": "20220503" }, { "ID": "CVE-2022-21455", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21455", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21509", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21509", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21515", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21515", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21517", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21517", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21522", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21522", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21525", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21525", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21526", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21526", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21527", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21527", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21528", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21528", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21529", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21529", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21530", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21530", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21531", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21531", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21534", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21534", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21535", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21535", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21537", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21537", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21538", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21538", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21539", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21539", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21547", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21547", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21553", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21553", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21556", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21556", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21569", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21569", "Impact": "None", "Public": "20220719" }, { "ID": "CVE-2022-21592", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21592", "Impact": "None", "Public": "20221018" }, { "ID": "CVE-2022-21635", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21635", "Impact": "None", "Public": "20221018" }, { "ID": "CVE-2022-21638", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21638", "Impact": "None", "Public": "20221018" }, { "ID": "CVE-2022-21641", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21641", "Impact": "None", "Public": "20221018" }, { "ID": "CVE-2022-21824", "CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "CWE": "CWE-1321", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", "Impact": "High", "Public": "20220224" }, { "ID": "CVE-2022-27778", "CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "CWE": "CWE-706", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27778", "Impact": "High", "Public": "20220602" }, { "ID": "CVE-2023-21872", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-21872", "Impact": "None", "Public": "20230118" } ], "AffectedCPEs": { "CPEs": [ "cpe:/o:alt:spworkstation:10", "cpe:/o:alt:spserver:10" ] } } }, "Criteria": { "Operator": "AND", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:5001", "Comment": "ALT Linux must be installed" } ], "Criterias": [ { "Operator": "OR", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:20223102001", "Comment": "MySQL-client is earlier than 0:8.0.30-alt1.1" }, { "TestRef": "oval:org.altlinux.errata:tst:20223102002", "Comment": "MySQL-server is earlier than 0:8.0.30-alt1.1" }, { "TestRef": "oval:org.altlinux.errata:tst:20223102003", "Comment": "MySQL-server-perl is earlier than 0:8.0.30-alt1.1" }, { "TestRef": "oval:org.altlinux.errata:tst:20223102004", "Comment": "libmysqlclient21 is earlier than 0:8.0.30-alt1.1" }, { "TestRef": "oval:org.altlinux.errata:tst:20223102005", "Comment": "libmysqlclient21-devel is earlier than 0:8.0.30-alt1.1" } ] } ] } } ] }