533 lines
34 KiB
JSON
533 lines
34 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20241385",
|
|
"Version": "oval:org.altlinux.errata:def:20241385",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2024-1385: package `MySQL` update to version 8.0.36-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p10"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2024-1385",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-1385",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00791",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00791",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00792",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00792",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00793",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00793",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00794",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00794",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00795",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00795",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00796",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00796",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00797",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00797",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00798",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00798",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00799",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00799",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-00800",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-00800",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20960",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20960",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20961",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20961",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20962",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20962",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20963",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20963",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20964",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20964",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20965",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20965",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20966",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20966",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20967",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20967",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20968",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20968",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20969",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20969",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20970",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20970",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20971",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20971",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20972",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20972",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20973",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20973",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20974",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20974",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20975",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20975",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20976",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20976",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20977",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20977",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20978",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20978",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20981",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20981",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20982",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20982",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20983",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20983",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20984",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20984",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-20985",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-20985",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades MySQL to version 8.0.36-alt1. \nSecurity Fix(es):\n\n * BDU:2024-00791: Уязвимость компонента Server: RAPID системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00792: Уязвимость компонента Server: Options системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00793: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00794: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00795: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00796: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00797: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00798: Уязвимость компонента Server: Security: Privileges системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00799: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00800: Уязвимость компонента Server : Security : Firewall системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2024-20960: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: RAPID). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20961: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20962: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20963: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20964: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20965: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20966: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20967: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2024-20968: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20969: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2024-20970: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20971: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20972: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20973: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20974: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20975: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20976: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20977: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20978: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20981: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20982: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20983: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20984: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server : Security : Firewall). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2024-20985: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Low",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2024-02-01"
|
|
},
|
|
"Updated": {
|
|
"Date": "2024-02-01"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2024-00791",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00791",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00792",
|
|
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00792",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00793",
|
|
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00793",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00794",
|
|
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00794",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00795",
|
|
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00795",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00796",
|
|
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00796",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00797",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00797",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00798",
|
|
"CVSS": "AV:N/AC:H/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00798",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00799",
|
|
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00799",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "BDU:2024-00800",
|
|
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-00800",
|
|
"Impact": "Low",
|
|
"Public": "20240116"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2024-20960",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20960",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20961",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20961",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20962",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20962",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20963",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20963",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20964",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20964",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20965",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20965",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20966",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20966",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20967",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20967",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20968",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20968",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20969",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20969",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20970",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20970",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20971",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20971",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20972",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20972",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20973",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20973",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20974",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20974",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20975",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20975",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20976",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20976",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20977",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20977",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20978",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20978",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20981",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20981",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20982",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20982",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20983",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20983",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20984",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20984",
|
|
"Impact": "None",
|
|
"Public": "20240217"
|
|
},
|
|
{
|
|
"ID": "CVE-2024-20985",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-20985",
|
|
"Impact": "None",
|
|
"Public": "20240116"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:10",
|
|
"cpe:/o:alt:workstation:10",
|
|
"cpe:/o:alt:server:10",
|
|
"cpe:/o:alt:server-v:10",
|
|
"cpe:/o:alt:education:10",
|
|
"cpe:/o:alt:slinux:10",
|
|
"cpe:/o:alt:starterkit:p10",
|
|
"cpe:/o:alt:kworkstation:10.1",
|
|
"cpe:/o:alt:workstation:10.1",
|
|
"cpe:/o:alt:server:10.1",
|
|
"cpe:/o:alt:server-v:10.1",
|
|
"cpe:/o:alt:education:10.1",
|
|
"cpe:/o:alt:slinux:10.1",
|
|
"cpe:/o:alt:starterkit:10.1",
|
|
"cpe:/o:alt:kworkstation:10.2",
|
|
"cpe:/o:alt:workstation:10.2",
|
|
"cpe:/o:alt:server:10.2",
|
|
"cpe:/o:alt:server-v:10.2",
|
|
"cpe:/o:alt:education:10.2",
|
|
"cpe:/o:alt:slinux:10.2",
|
|
"cpe:/o:alt:starterkit:10.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20241385001",
|
|
"Comment": "MySQL-client is earlier than 0:8.0.36-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20241385002",
|
|
"Comment": "MySQL-server is earlier than 0:8.0.36-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20241385003",
|
|
"Comment": "MySQL-server-perl is earlier than 0:8.0.36-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20241385004",
|
|
"Comment": "libmysqlclient21 is earlier than 0:8.0.36-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20241385005",
|
|
"Comment": "libmysqlclient21-devel is earlier than 0:8.0.36-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |