7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
0.003 Low
EPSS
Percentile
69.0%
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30).
Security Fix(es):
mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413)
mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265)
mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415)
mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596)
mysql: C API unspecified vulnerability (CVE-2021-35597)
mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515)
mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423)
mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454)
mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538)
mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625)
mysql: Server: GIS unspecified vulnerability (CVE-2021-35631)
mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632)
mysql: Server: PS unspecified vulnerability (CVE-2021-35637)
mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534)
mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427)
mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547)
mysql: Server: Parser unspecified vulnerability (CVE-2022-21304)
mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374)
mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367)
mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368)
mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249)
mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457)
mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633)
mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
bugzilla.redhat.com/show_bug.cgi?id=2016089
bugzilla.redhat.com/show_bug.cgi?id=2016090
bugzilla.redhat.com/show_bug.cgi?id=2016091
bugzilla.redhat.com/show_bug.cgi?id=2016093
bugzilla.redhat.com/show_bug.cgi?id=2016094
bugzilla.redhat.com/show_bug.cgi?id=2016095
bugzilla.redhat.com/show_bug.cgi?id=2016097
bugzilla.redhat.com/show_bug.cgi?id=2016098
bugzilla.redhat.com/show_bug.cgi?id=2016099
bugzilla.redhat.com/show_bug.cgi?id=2016100
bugzilla.redhat.com/show_bug.cgi?id=2016101
bugzilla.redhat.com/show_bug.cgi?id=2016104
bugzilla.redhat.com/show_bug.cgi?id=2016105
bugzilla.redhat.com/show_bug.cgi?id=2016106
bugzilla.redhat.com/show_bug.cgi?id=2016107
bugzilla.redhat.com/show_bug.cgi?id=2016108
bugzilla.redhat.com/show_bug.cgi?id=2016109
bugzilla.redhat.com/show_bug.cgi?id=2016110
bugzilla.redhat.com/show_bug.cgi?id=2016111
bugzilla.redhat.com/show_bug.cgi?id=2016112
bugzilla.redhat.com/show_bug.cgi?id=2016113
bugzilla.redhat.com/show_bug.cgi?id=2016114
bugzilla.redhat.com/show_bug.cgi?id=2016117
bugzilla.redhat.com/show_bug.cgi?id=2016118
bugzilla.redhat.com/show_bug.cgi?id=2016119
bugzilla.redhat.com/show_bug.cgi?id=2016120
bugzilla.redhat.com/show_bug.cgi?id=2016121
bugzilla.redhat.com/show_bug.cgi?id=2016122
bugzilla.redhat.com/show_bug.cgi?id=2016124
bugzilla.redhat.com/show_bug.cgi?id=2016126
bugzilla.redhat.com/show_bug.cgi?id=2016127
bugzilla.redhat.com/show_bug.cgi?id=2016128
bugzilla.redhat.com/show_bug.cgi?id=2016129
bugzilla.redhat.com/show_bug.cgi?id=2016130
bugzilla.redhat.com/show_bug.cgi?id=2016131
bugzilla.redhat.com/show_bug.cgi?id=2016132
bugzilla.redhat.com/show_bug.cgi?id=2016133
bugzilla.redhat.com/show_bug.cgi?id=2016134
bugzilla.redhat.com/show_bug.cgi?id=2016135
bugzilla.redhat.com/show_bug.cgi?id=2016137
bugzilla.redhat.com/show_bug.cgi?id=2016138
bugzilla.redhat.com/show_bug.cgi?id=2043620
bugzilla.redhat.com/show_bug.cgi?id=2043621
bugzilla.redhat.com/show_bug.cgi?id=2043622
bugzilla.redhat.com/show_bug.cgi?id=2043623
bugzilla.redhat.com/show_bug.cgi?id=2043624
bugzilla.redhat.com/show_bug.cgi?id=2043625
bugzilla.redhat.com/show_bug.cgi?id=2043626
bugzilla.redhat.com/show_bug.cgi?id=2043627
bugzilla.redhat.com/show_bug.cgi?id=2043628
bugzilla.redhat.com/show_bug.cgi?id=2043629
bugzilla.redhat.com/show_bug.cgi?id=2043630
bugzilla.redhat.com/show_bug.cgi?id=2043631
bugzilla.redhat.com/show_bug.cgi?id=2043632
bugzilla.redhat.com/show_bug.cgi?id=2043633
bugzilla.redhat.com/show_bug.cgi?id=2043634
bugzilla.redhat.com/show_bug.cgi?id=2043635
bugzilla.redhat.com/show_bug.cgi?id=2043636
bugzilla.redhat.com/show_bug.cgi?id=2043637
bugzilla.redhat.com/show_bug.cgi?id=2043638
bugzilla.redhat.com/show_bug.cgi?id=2043639
bugzilla.redhat.com/show_bug.cgi?id=2043640
bugzilla.redhat.com/show_bug.cgi?id=2043641
bugzilla.redhat.com/show_bug.cgi?id=2043642
bugzilla.redhat.com/show_bug.cgi?id=2043643
bugzilla.redhat.com/show_bug.cgi?id=2043644
bugzilla.redhat.com/show_bug.cgi?id=2043645
bugzilla.redhat.com/show_bug.cgi?id=2043646
bugzilla.redhat.com/show_bug.cgi?id=2043647
bugzilla.redhat.com/show_bug.cgi?id=2043648
bugzilla.redhat.com/show_bug.cgi?id=2082636
bugzilla.redhat.com/show_bug.cgi?id=2082637
bugzilla.redhat.com/show_bug.cgi?id=2082638
bugzilla.redhat.com/show_bug.cgi?id=2082639
bugzilla.redhat.com/show_bug.cgi?id=2082640
bugzilla.redhat.com/show_bug.cgi?id=2082641
bugzilla.redhat.com/show_bug.cgi?id=2082642
bugzilla.redhat.com/show_bug.cgi?id=2082643
bugzilla.redhat.com/show_bug.cgi?id=2082644
bugzilla.redhat.com/show_bug.cgi?id=2082645
bugzilla.redhat.com/show_bug.cgi?id=2082646
bugzilla.redhat.com/show_bug.cgi?id=2082647
bugzilla.redhat.com/show_bug.cgi?id=2082648
bugzilla.redhat.com/show_bug.cgi?id=2082649
bugzilla.redhat.com/show_bug.cgi?id=2082650
bugzilla.redhat.com/show_bug.cgi?id=2082651
bugzilla.redhat.com/show_bug.cgi?id=2082652
bugzilla.redhat.com/show_bug.cgi?id=2082653
bugzilla.redhat.com/show_bug.cgi?id=2082654
bugzilla.redhat.com/show_bug.cgi?id=2082655
bugzilla.redhat.com/show_bug.cgi?id=2082656
bugzilla.redhat.com/show_bug.cgi?id=2082657
bugzilla.redhat.com/show_bug.cgi?id=2082658
bugzilla.redhat.com/show_bug.cgi?id=2082659
bugzilla.redhat.com/show_bug.cgi?id=2110940
bugzilla.redhat.com/show_bug.cgi?id=2115283
bugzilla.redhat.com/show_bug.cgi?id=2115284
bugzilla.redhat.com/show_bug.cgi?id=2115285
bugzilla.redhat.com/show_bug.cgi?id=2115286
bugzilla.redhat.com/show_bug.cgi?id=2115287
bugzilla.redhat.com/show_bug.cgi?id=2115288
bugzilla.redhat.com/show_bug.cgi?id=2115289
bugzilla.redhat.com/show_bug.cgi?id=2115290
bugzilla.redhat.com/show_bug.cgi?id=2115291
bugzilla.redhat.com/show_bug.cgi?id=2115292
bugzilla.redhat.com/show_bug.cgi?id=2115293
bugzilla.redhat.com/show_bug.cgi?id=2115294
bugzilla.redhat.com/show_bug.cgi?id=2115295
bugzilla.redhat.com/show_bug.cgi?id=2115296
bugzilla.redhat.com/show_bug.cgi?id=2115297
bugzilla.redhat.com/show_bug.cgi?id=2115298
bugzilla.redhat.com/show_bug.cgi?id=2115299
bugzilla.redhat.com/show_bug.cgi?id=2115301
bugzilla.redhat.com/show_bug.cgi?id=2122604
errata.rockylinux.org/RLSA-2022:7119
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
0.003 Low
EPSS
Percentile
69.0%