{"id":"ALSA-2022:6590","summary":"Moderate: mysql security, bug fix, and enhancement update","details":"MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)\n\nSecurity Fix(es):\n\n* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)\n* mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)\n* mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)\n* mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)\n* mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)\n* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)\n* mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)\n* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)\n* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)\n* mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)\n* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)\n* mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)\n* mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)\n* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)\n* mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)\n* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Default logrotate set to wrong log file (BZ#2122592)","modified":"2026-02-04T04:15:45.068091Z","published":"2022-09-20T00:00:00Z","related":["CVE-2022-21412","CVE-2022-21413","CVE-2022-21414","CVE-2022-21415","CVE-2022-21417","CVE-2022-21418","CVE-2022-21423","CVE-2022-21425","CVE-2022-21427","CVE-2022-21435","CVE-2022-21436","CVE-2022-21437","CVE-2022-21438","CVE-2022-21440","CVE-2022-21444","CVE-2022-21451","CVE-2022-21452","CVE-2022-21454","CVE-2022-21455","CVE-2022-21457","CVE-2022-21459","CVE-2022-21460","CVE-2022-21462","CVE-2022-21478","CVE-2022-21479","CVE-2022-21509","CVE-2022-21515","CVE-2022-21517","CVE-2022-21522","CVE-2022-21525","CVE-2022-21526","CVE-2022-21527","CVE-2022-21528","CVE-2022-21529","CVE-2022-21530","CVE-2022-21531","CVE-2022-21534","CVE-2022-21537","CVE-2022-21538","CVE-2022-21539","CVE-2022-21547","CVE-2022-21553","CVE-2022-21556","CVE-2022-21569"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21412"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21413"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21414"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21415"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21417"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21418"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21423"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21425"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21427"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21435"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21436"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21437"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21438"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21440"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21444"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21451"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21452"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21454"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21455"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21459"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21460"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21462"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21478"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21479"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21509"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21515"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21517"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21522"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21525"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21526"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21527"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21528"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21529"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21530"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21531"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21534"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21537"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21538"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21539"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21547"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21553"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21556"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21569"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082637"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082638"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082639"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082640"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082641"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082643"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082644"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082647"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082648"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082650"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082651"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082652"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082655"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082656"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082658"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082659"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115282"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115284"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115285"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115286"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115287"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115288"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115289"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115290"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115293"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115294"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115295"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115296"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115298"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115299"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115300"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115301"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2022-6590.html"}],"affected":[{"package":{"name":"mysql","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-3.el9_0"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:6590.json"}},{"package":{"name":"mysql-common","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-3.el9_0"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:6590.json"}},{"package":{"name":"mysql-devel","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-3.el9_0"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:6590.json"}},{"package":{"name":"mysql-errmsg","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-3.el9_0"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:6590.json"}},{"package":{"name":"mysql-libs","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-3.el9_0"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:6590.json"}},{"package":{"name":"mysql-server","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-3.el9_0"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:6590.json"}},{"package":{"name":"mysql-test","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-3.el9_0"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2022:6590.json"}}],"schema_version":"1.7.3"}