Bug 2245012 (CVE-2023-22026) - CVE-2023-22026 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
Summary: CVE-2023-22026 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
Keywords:
Status: NEW
Alias: CVE-2023-22026
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2162317 2162318 2162319 2162320 2162321
Blocks: 2245035
TreeView+ depends on / blocked
 
Reported: 2023-10-19 09:34 UTC by Mauro Matteo Cascella
Modified: 2023-10-30 10:52 UTC (History)
4 users (show)

Fixed In Version: mysql 5.7.43, mysql 8.0.32
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2023-10-19 09:34:01 UTC
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

External References:

https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixMSQL

Comment 1 Mauro Matteo Cascella 2023-10-30 10:26:49 UTC
The Oracle advisory states that this issue was fixed upstream in version 8.0.32. The mysql packages as shipped in following Red Hat products were previously updated to a version that contains the fix via the following errata:

mysql:8.0/mysql in Red Hat Enterprise Linux 8
https://access.redhat.com/errata/RHSA-2023:3087

mysql in Red Hat Enterprise Linux 9
https://access.redhat.com/errata/RHSA-2023:2621

rh-mysql80-mysql in Red Hat Software Collections
https://access.redhat.com/errata/RHSA-2023:1102


Note You need to log in before you can comment on or make changes to this bug.