Bug 2082644 (CVE-2022-21427) - CVE-2022-21427 mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)
Summary: CVE-2022-21427 mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-21427
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2083175 2083176 2083178 2083181 2083183 2083185 2083229 2083232 2083233 2083246 2083247 2083248 2083249 2083250 2083303 2083305 2090833 2107052 2107074 2110941 2122591
Blocks: 2082660
TreeView+ depends on / blocked
 
Reported: 2022-05-06 16:27 UTC by Mauro Matteo Cascella
Modified: 2022-12-01 18:18 UTC (History)
16 users (show)

Fixed In Version: mysql 5.7.38, mysql 8.0.29, mariadb 10.5.7, mariadb 10.4.25, mariadb 10.3.35, mariadb 10.2.44
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-12-01 18:18:28 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:6306 0 None None None 2022-09-01 14:20:40 UTC
Red Hat Product Errata RHSA-2022:6443 0 None None None 2022-09-13 09:43:29 UTC
Red Hat Product Errata RHSA-2022:6518 0 None None None 2022-09-14 13:48:14 UTC
Red Hat Product Errata RHSA-2022:6590 0 None None None 2022-09-20 13:51:09 UTC
Red Hat Product Errata RHSA-2022:7119 0 None None None 2022-10-25 09:26:00 UTC

Description Mauro Matteo Cascella 2022-05-06 16:27:46 UTC
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

External References:

https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL

Comment 1 Mauro Matteo Cascella 2022-05-09 13:24:36 UTC
Created community-mysql tracking bugs for this issue:

Affects: fedora-all [bug 2083183]


Created mariadb tracking bugs for this issue:

Affects: fedora-all [bug 2083175]


Created mariadb:10.3/mariadb tracking bugs for this issue:

Affects: fedora-all [bug 2083176]


Created mariadb:10.4/mariadb tracking bugs for this issue:

Affects: fedora-all [bug 2083178]


Created mariadb:10.5/mariadb tracking bugs for this issue:

Affects: fedora-all [bug 2083181]


Created mysql:8.0/community-mysql tracking bugs for this issue:

Affects: fedora-all [bug 2083185]

Comment 6 errata-xmlrpc 2022-09-01 14:20:38 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:6306 https://access.redhat.com/errata/RHSA-2022:6306

Comment 7 errata-xmlrpc 2022-09-13 09:43:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:6443 https://access.redhat.com/errata/RHSA-2022:6443

Comment 8 errata-xmlrpc 2022-09-14 13:48:12 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:6518 https://access.redhat.com/errata/RHSA-2022:6518

Comment 9 errata-xmlrpc 2022-09-20 13:51:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:6590 https://access.redhat.com/errata/RHSA-2022:6590

Comment 10 errata-xmlrpc 2022-10-25 09:25:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7119 https://access.redhat.com/errata/RHSA-2022:7119

Comment 11 Product Security DevOps Team 2022-12-01 18:18:26 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-21427


Note You need to log in before you can comment on or make changes to this bug.