CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
AI Score
Confidence
Low
EPSS
Percentile
55.7%
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.28 in Ubuntu 20.04 LTS and Ubuntu 21.10.
Ubuntu 18.04 LTS has been updated to MySQL 5.7.37.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
<https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-37.html>
<https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-28.html>
<https://www.oracle.com/security-alerts/cpujan2022.html>
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 21.10 | noarch | mysql-server-8.0 | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | libmysqlclient-dev | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | libmysqlclient21 | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | libmysqlclient21-dbgsym | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | mysql-client | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | mysql-client-8.0 | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | mysql-client-core-8.0 | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | mysql-client-core-8.0-dbgsym | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | mysql-router | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
Ubuntu | 21.10 | noarch | mysql-router-dbgsym | < 8.0.28-0ubuntu0.21.10.3 | UNKNOWN |
ubuntu.com/security/CVE-2022-21245
ubuntu.com/security/CVE-2022-21249
ubuntu.com/security/CVE-2022-21253
ubuntu.com/security/CVE-2022-21254
ubuntu.com/security/CVE-2022-21256
ubuntu.com/security/CVE-2022-21264
ubuntu.com/security/CVE-2022-21265
ubuntu.com/security/CVE-2022-21270
ubuntu.com/security/CVE-2022-21301
ubuntu.com/security/CVE-2022-21302
ubuntu.com/security/CVE-2022-21303
ubuntu.com/security/CVE-2022-21304
ubuntu.com/security/CVE-2022-21339
ubuntu.com/security/CVE-2022-21342
ubuntu.com/security/CVE-2022-21344
ubuntu.com/security/CVE-2022-21348
ubuntu.com/security/CVE-2022-21351
ubuntu.com/security/CVE-2022-21358
ubuntu.com/security/CVE-2022-21362
ubuntu.com/security/CVE-2022-21367
ubuntu.com/security/CVE-2022-21368
ubuntu.com/security/CVE-2022-21370
ubuntu.com/security/CVE-2022-21372
ubuntu.com/security/CVE-2022-21374
ubuntu.com/security/CVE-2022-21378
ubuntu.com/security/CVE-2022-21379
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
AI Score
Confidence
Low
EPSS
Percentile
55.7%