RHEL 9 : mysql (RHSA-2022:6590)

medium Nessus Plugin ID 165274

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2022:6590 advisory.

- mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)

- mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)

- mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)

- mysql: InnoDB unspecified vulnerability (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21423, CVE-2022-21451)

- mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)

- mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)

- mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)

- mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)

- mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)

- mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)

- mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)

- mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)

- mysql: InnoDB unspecified vulnerability (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)

- mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)

- mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)

- mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)

- mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022) (CVE-2022-21592)

- mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022) (CVE-2022-21605)

- mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21607, CVE-2022-21638, CVE-2022-21641)

- mysql: InnoDB unspecified vulnerability (CPU Oct 2022) (CVE-2022-21635)

- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21866, CVE-2023-21872)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/CVE-2022-21415

https://access.redhat.com/security/cve/CVE-2022-21417

https://access.redhat.com/security/cve/CVE-2022-21418

https://access.redhat.com/security/cve/CVE-2022-21423

https://access.redhat.com/security/cve/CVE-2022-21425

https://access.redhat.com/security/cve/CVE-2022-21427

https://access.redhat.com/security/cve/CVE-2022-21435

https://access.redhat.com/security/cve/CVE-2022-21436

https://access.redhat.com/security/cve/CVE-2022-21437

https://access.redhat.com/security/cve/CVE-2022-21438

https://access.redhat.com/security/cve/CVE-2022-21440

https://access.redhat.com/security/cve/CVE-2022-21444

https://access.redhat.com/security/cve/CVE-2022-21451

https://access.redhat.com/security/cve/CVE-2022-21452

https://access.redhat.com/security/cve/CVE-2022-21454

https://access.redhat.com/security/cve/CVE-2022-21455

https://access.redhat.com/security/cve/CVE-2022-21457

https://access.redhat.com/security/cve/CVE-2022-21459

https://access.redhat.com/security/cve/CVE-2022-21607

https://access.redhat.com/security/cve/CVE-2022-21635

https://access.redhat.com/security/cve/CVE-2022-21638

https://access.redhat.com/security/cve/CVE-2022-21641

https://access.redhat.com/security/cve/CVE-2023-21866

https://access.redhat.com/security/cve/CVE-2023-21872

https://access.redhat.com/errata/RHSA-2022:6590

https://bugzilla.redhat.com/2082636

https://bugzilla.redhat.com/2082637

https://bugzilla.redhat.com/2082638

https://bugzilla.redhat.com/2082639

https://bugzilla.redhat.com/2082640

https://bugzilla.redhat.com/2082641

https://bugzilla.redhat.com/2082642

https://bugzilla.redhat.com/2082643

https://bugzilla.redhat.com/2082644

https://bugzilla.redhat.com/2082645

https://bugzilla.redhat.com/2082646

https://bugzilla.redhat.com/2082647

https://bugzilla.redhat.com/2082648

https://bugzilla.redhat.com/2082649

https://bugzilla.redhat.com/2082650

https://bugzilla.redhat.com/2082651

https://bugzilla.redhat.com/2082652

https://access.redhat.com/security/cve/CVE-2022-21412

https://access.redhat.com/security/cve/CVE-2022-21413

https://access.redhat.com/security/cve/CVE-2022-21414

https://access.redhat.com/security/cve/CVE-2022-21460

https://access.redhat.com/security/cve/CVE-2022-21462

https://access.redhat.com/security/cve/CVE-2022-21478

https://access.redhat.com/security/cve/CVE-2022-21479

https://access.redhat.com/security/cve/CVE-2022-21509

https://access.redhat.com/security/cve/CVE-2022-21515

https://access.redhat.com/security/cve/CVE-2022-21517

https://access.redhat.com/security/cve/CVE-2022-21522

https://access.redhat.com/security/cve/CVE-2022-21525

https://access.redhat.com/security/cve/CVE-2022-21526

https://access.redhat.com/security/cve/CVE-2022-21527

https://access.redhat.com/security/cve/CVE-2022-21528

https://access.redhat.com/security/cve/CVE-2022-21529

https://access.redhat.com/security/cve/CVE-2022-21530

https://access.redhat.com/security/cve/CVE-2022-21531

https://access.redhat.com/security/cve/CVE-2022-21534

https://access.redhat.com/security/cve/CVE-2022-21537

https://access.redhat.com/security/cve/CVE-2022-21538

https://access.redhat.com/security/cve/CVE-2022-21539

https://access.redhat.com/security/cve/CVE-2022-21547

https://access.redhat.com/security/cve/CVE-2022-21553

https://access.redhat.com/security/cve/CVE-2022-21556

https://access.redhat.com/security/cve/CVE-2022-21569

https://access.redhat.com/security/cve/CVE-2022-21592

https://access.redhat.com/security/cve/CVE-2022-21605

https://bugzilla.redhat.com/2082653

https://bugzilla.redhat.com/2082654

https://bugzilla.redhat.com/2082655

https://bugzilla.redhat.com/2082656

https://bugzilla.redhat.com/2082657

https://bugzilla.redhat.com/2082658

https://bugzilla.redhat.com/2082659

https://bugzilla.redhat.com/2115282

https://bugzilla.redhat.com/2115283

https://bugzilla.redhat.com/2115284

https://bugzilla.redhat.com/2115285

https://bugzilla.redhat.com/2115286

https://bugzilla.redhat.com/2115287

https://bugzilla.redhat.com/2115288

https://bugzilla.redhat.com/2115289

https://bugzilla.redhat.com/2115290

https://bugzilla.redhat.com/2115291

https://bugzilla.redhat.com/2115292

https://bugzilla.redhat.com/2115293

https://bugzilla.redhat.com/2115294

https://bugzilla.redhat.com/2115295

https://bugzilla.redhat.com/2115296

https://bugzilla.redhat.com/2115297

https://bugzilla.redhat.com/2115298

https://bugzilla.redhat.com/2115299

https://bugzilla.redhat.com/2115300

https://bugzilla.redhat.com/2115301

https://bugzilla.redhat.com/2142860

https://bugzilla.redhat.com/2142866

https://bugzilla.redhat.com/2142867

https://bugzilla.redhat.com/2142874

https://bugzilla.redhat.com/2142876

https://bugzilla.redhat.com/2142878

https://bugzilla.redhat.com/2162273

https://bugzilla.redhat.com/2162279

Plugin Details

Severity: Medium

ID: 165274

File Name: redhat-RHSA-2022-6590.nasl

Version: 1.7

Type: local

Agent: unix

Published: 9/21/2022

Updated: 11/1/2023

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:P

CVSS Score Source: CVE-2022-21479

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2022-21635

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:9, cpe:/o:redhat:rhel_aus:9.2, cpe:/o:redhat:rhel_e4s:9.0, cpe:/o:redhat:rhel_e4s:9.2, cpe:/o:redhat:rhel_eus:9.0, cpe:/o:redhat:rhel_eus:9.2, p-cpe:/a:redhat:enterprise_linux:mysql, p-cpe:/a:redhat:enterprise_linux:mysql-common, p-cpe:/a:redhat:enterprise_linux:mysql-devel, p-cpe:/a:redhat:enterprise_linux:mysql-errmsg, p-cpe:/a:redhat:enterprise_linux:mysql-libs, p-cpe:/a:redhat:enterprise_linux:mysql-server, p-cpe:/a:redhat:enterprise_linux:mysql-test

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/20/2022

Vulnerability Publication Date: 4/12/2022

Reference Information

CVE: CVE-2022-21412, CVE-2022-21413, CVE-2022-21414, CVE-2022-21415, CVE-2022-21417, CVE-2022-21418, CVE-2022-21423, CVE-2022-21425, CVE-2022-21427, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21444, CVE-2022-21451, CVE-2022-21452, CVE-2022-21454, CVE-2022-21455, CVE-2022-21457, CVE-2022-21459, CVE-2022-21460, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21515, CVE-2022-21517, CVE-2022-21522, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21534, CVE-2022-21537, CVE-2022-21538, CVE-2022-21539, CVE-2022-21547, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569, CVE-2022-21592, CVE-2022-21605, CVE-2022-21607, CVE-2022-21635, CVE-2022-21638, CVE-2022-21641, CVE-2023-21866, CVE-2023-21872

IAVA: 2022-A-0168-S, 2022-A-0291-S

RHSA: 2022:6590