{"id":"ALSA-2022:7119","summary":"Moderate: mysql:8.0 security, bug fix, and enhancement update","details":"MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe following packages have been upgraded to a later upstream version: mysql (8.0.30).\n\nSecurity Fix(es):\n\n* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413)\n* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265)\n* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415)\n* mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596)\n* mysql: C API unspecified vulnerability (CVE-2021-35597)\n* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515)\n* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423)\n* mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454)\n* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538)\n* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625)\n* mysql: Server: GIS unspecified vulnerability (CVE-2021-35631)\n* mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632)\n* mysql: Server: PS unspecified vulnerability (CVE-2021-35637)\n* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534)\n* mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427)\n* mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547)\n* mysql: Server: Parser unspecified vulnerability (CVE-2022-21304)\n* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374)\n* mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367)\n* mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368)\n* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249)\n* mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457)\n* mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633)\n* mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [almalinux-8] (BZ#2110940)","modified":"2026-02-04T02:37:23.574416Z","published":"2022-10-25T00:00:00Z","related":["CVE-2021-2478","CVE-2021-2479","CVE-2021-2481","CVE-2021-35546","CVE-2021-35575","CVE-2021-35577","CVE-2021-35591","CVE-2021-35596","CVE-2021-35597","CVE-2021-35602","CVE-2021-35604","CVE-2021-35607","CVE-2021-35608","CVE-2021-35610","CVE-2021-35612","CVE-2021-35622","CVE-2021-35623","CVE-2021-35624","CVE-2021-35625","CVE-2021-35626","CVE-2021-35627","CVE-2021-35628","CVE-2021-35630","CVE-2021-35631","CVE-2021-35632","CVE-2021-35633","CVE-2021-35634","CVE-2021-35635","CVE-2021-35636","CVE-2021-35637","CVE-2021-35638","CVE-2021-35639","CVE-2021-35640","CVE-2021-35641","CVE-2021-35642","CVE-2021-35643","CVE-2021-35644","CVE-2021-35645","CVE-2021-35646","CVE-2021-35647","CVE-2021-35648","CVE-2022-21245","CVE-2022-21249","CVE-2022-21253","CVE-2022-21254","CVE-2022-21256","CVE-2022-21264","CVE-2022-21265","CVE-2022-21270","CVE-2022-21278","CVE-2022-21297","CVE-2022-21301","CVE-2022-21302","CVE-2022-21303","CVE-2022-21304","CVE-2022-21339","CVE-2022-21342","CVE-2022-21344","CVE-2022-21348","CVE-2022-21351","CVE-2022-21352","CVE-2022-21358","CVE-2022-21362","CVE-2022-21367","CVE-2022-21368","CVE-2022-21370","CVE-2022-21372","CVE-2022-21374","CVE-2022-21378","CVE-2022-21379","CVE-2022-21412","CVE-2022-21413","CVE-2022-21414","CVE-2022-21415","CVE-2022-21417","CVE-2022-21418","CVE-2022-21423","CVE-2022-21425","CVE-2022-21427","CVE-2022-21435","CVE-2022-21436","CVE-2022-21437","CVE-2022-21438","CVE-2022-21440","CVE-2022-21444","CVE-2022-21451","CVE-2022-21452","CVE-2022-21454","CVE-2022-21457","CVE-2022-21459","CVE-2022-21460","CVE-2022-21462","CVE-2022-21478","CVE-2022-21479","CVE-2022-21509","CVE-2022-21515","CVE-2022-21517","CVE-2022-21522","CVE-2022-21525","CVE-2022-21526","CVE-2022-21527","CVE-2022-21528","CVE-2022-21529","CVE-2022-21530","CVE-2022-21531","CVE-2022-21534","CVE-2022-21537","CVE-2022-21538","CVE-2022-21539","CVE-2022-21547","CVE-2022-21553","CVE-2022-21569"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-2478"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-2479"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-2481"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35546"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35575"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35577"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35591"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35596"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35597"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35602"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35604"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35607"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35608"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35610"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35612"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35622"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35623"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35624"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35625"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35626"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35627"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35628"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35630"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35631"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35632"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35633"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35634"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35635"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35636"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35637"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35638"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35639"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35640"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35641"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35642"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35643"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35644"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35645"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35646"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35647"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-35648"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21245"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21249"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21253"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21254"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21256"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21264"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21265"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21270"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21278"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21297"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21301"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21302"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21303"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21304"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21339"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21342"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21344"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21348"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21351"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21352"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21358"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21362"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21367"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21368"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21370"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21372"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21374"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21378"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21379"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21412"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21413"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21414"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21415"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21417"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21418"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21423"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21425"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21427"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21435"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21436"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21437"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21438"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21440"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21444"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21451"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21452"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21454"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21457"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21459"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21460"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21462"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21478"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21479"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21509"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21515"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21517"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21522"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21525"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21526"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21527"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21528"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21529"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21530"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21531"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21534"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21537"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21538"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21539"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21547"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21553"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21569"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016089"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016090"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016094"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016097"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016098"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016099"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016100"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016101"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016104"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016105"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016106"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016107"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016109"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016110"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016111"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016112"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016113"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016114"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016117"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016118"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016119"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016120"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016121"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016122"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016124"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016126"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016127"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016128"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016129"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016130"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016131"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016133"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016134"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016135"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016137"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2016138"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043620"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043621"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043622"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043624"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043625"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043626"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043628"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043629"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043630"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043631"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043633"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043635"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043637"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043638"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043639"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043640"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043641"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043643"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043644"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043647"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2043648"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082637"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082638"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082639"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082640"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082641"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082643"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082644"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082647"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082648"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082650"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082651"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082652"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082654"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082655"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082656"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082658"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2082659"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115284"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115285"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115286"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115287"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115288"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115289"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115290"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115293"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115294"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115295"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115296"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115298"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115299"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2115301"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2022-7119.html"}],"affected":[{"package":{"name":"mecab","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mecab"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.996-2.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mecab-ipadic","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mecab-ipadic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.0.20070801-16.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mecab-ipadic","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mecab-ipadic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.0.20070801-16.module_el8.6.0+3151+3a7073b7"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mecab-ipadic-EUCJP","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mecab-ipadic-EUCJP"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.0.20070801-16.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mecab-ipadic-EUCJP","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mecab-ipadic-EUCJP"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.0.20070801-16.module_el8.6.0+3151+3a7073b7"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mysql","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mysql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-1.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mysql-common","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mysql-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-1.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mysql-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mysql-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-1.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mysql-errmsg","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mysql-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-1.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mysql-libs","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mysql-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-1.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mysql-server","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mysql-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-1.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}},{"package":{"name":"mysql-test","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mysql-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.30-1.module_el8.6.0+3340+d764b636"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:7119.json"}}],"schema_version":"1.7.3"}