125 Star 1 Fork 58

src-openEuler/mysql

 / 详情

CVE-2023-21866

已完成
CVE和安全问题
创建于  
2023-02-09 15:12

一、漏洞信息
漏洞编号:CVE-2023-21866
漏洞归属组件:mysql
漏洞归属的版本:8.0.17,8.0.23,8.0.24,8.0.26,8.0.27,8.0.28,8.0.29,8.0.30,8.0.35
CVSS V3.0分值:
BaseScore:4.9 Medium
Vector:CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
漏洞简述:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
漏洞公开时间:2023-01-18 08:15:15
漏洞创建时间:2023-02-09 15:12:52
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2023-21866

更多参考(点击展开)
参考来源 参考链接 来源链接
secalert_us.oracle.com https://www.oracle.com/security-alerts/cpujan2023.html
redhat_bugzilla https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL https://bugzilla.redhat.com/show_bug.cgi?id=2162273
redhat_bugzilla https://access.redhat.com/errata/RHSA-2022:6590 https://bugzilla.redhat.com/show_bug.cgi?id=2162273
redhat_bugzilla https://access.redhat.com/errata/RHSA-2022:7119 https://bugzilla.redhat.com/show_bug.cgi?id=2162273
redhat_bugzilla https://access.redhat.com/errata/RHSA-2022:6518 https://bugzilla.redhat.com/show_bug.cgi?id=2162273
redhat_bugzilla https://access.redhat.com/security/cve/cve-2023-21866 https://bugzilla.redhat.com/show_bug.cgi?id=2162273
ubuntu https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21866 https://ubuntu.com/security/CVE-2023-21866
ubuntu https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL https://ubuntu.com/security/CVE-2023-21866
ubuntu https://nvd.nist.gov/vuln/detail/CVE-2023-21866 https://ubuntu.com/security/CVE-2023-21866
ubuntu https://launchpad.net/bugs/cve/CVE-2023-21866 https://ubuntu.com/security/CVE-2023-21866
ubuntu https://security-tracker.debian.org/tracker/CVE-2023-21866 https://ubuntu.com/security/CVE-2023-21866
debian https://security-tracker.debian.org/tracker/CVE-2023-21866
oracle https://www.oracle.com/security-alerts/cpujan2023.html
anolis https://anas.openanolis.cn/cves/detail/CVE-2023-21866
cve_search https://www.oracle.com/security-alerts/cpujan2023.html
osv https://www.oracle.com/security-alerts/cpujan2023.html https://osv.dev/vulnerability/CVE-2023-21866
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2023-21866 https://explore.alas.aws.amazon.com/CVE-2023-21866.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21866 https://explore.alas.aws.amazon.com/CVE-2023-21866.html
osv https://errata.rockylinux.org/RLSA-2022:6590 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082636 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082637 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082638 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082639 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082640 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082641 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082642 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082643 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082644 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082645 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082646 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082647 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082648 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082649 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082650 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082651 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082652 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082653 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082654 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082655 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082656 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082657 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082658 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2082659 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115282 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115283 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115284 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115285 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115286 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115287 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115288 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115289 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115290 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115291 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115292 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115293 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115294 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115295 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115296 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115297 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115298 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115299 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115300 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2115301 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2122589 https://osv.dev/vulnerability/RLSA-2022:6590
osv https://bugzilla.redhat.com/show_bug.cgi?id=2122592 https://osv.dev/vulnerability/RLSA-2022:6590
nvd https://www.oracle.com/security-alerts/cpujan2023.html
redhat https://access.redhat.com/security/cve/CVE-2023-21866
nvd https://www.oracle.com/security-alerts/cpujan2023.html

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://www.oracle.com/security-alerts/cpujan2023.html nvd

二、漏洞分析结构反馈
影响性分析说明:
该漏洞需升级至8.0.29版本修复,20.03-SP4分支采用升级至8.0.38修复,其他分支基线已修复不受影响
openEuler评分:
4.9
Vector:CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(8.0.28):受影响
2.master(8.0.27):不受影响
3.openEuler-22.03-LTS-SP1(8.0.37):不受影响
4.openEuler-22.03-LTS-SP3(8.0.37):不受影响
5.openEuler-24.03-LTS(8.0.35):不受影响
6.openEuler-24.03-LTS-Next(8.0.37):不受影响
7.openEuler-22.03-LTS-SP4(8.0.37):不受影响

修复是否涉及abi变化(是/否):
1.master(8.0.27):否
2.openEuler-20.03-LTS-SP4(8.0.28):否
3.openEuler-22.03-LTS-SP1(8.0.37):否
4.openEuler-22.03-LTS-SP3(8.0.37):否
5.openEuler-24.03-LTS(8.0.35):否
6.openEuler-24.03-LTS-Next(8.0.37):否
7.openEuler-22.03-LTS-SP4(8.0.37):否

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2024-2071

评论 (6)

majun-bot 创建了CVE和安全问题 2年前
majun-bot 添加了
 
CVE/UNFIXED
标签
2年前
展开全部操作日志
openeuler-ci-bot 添加了
 
sig/Others
标签
2年前
参考网址 关联pr 状态 补丁链接
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-21866
https://www.opencve.io/cve/CVE-2023-21866
https://nvd.nist.gov/vuln/detail/CVE-2023-21866
https://security-tracker.debian.org/tracker/CVE-2023-21866
https://ubuntu.com/security/CVE-2023-21866NoneNonehttps://discourse.ubuntu.com/c/ubuntu-pro
http://www.cnnvd.org.cn/web/vulnerability/queryLds.tag?qcvCnnvdid=CVE-2023-21866

说明:补丁链接仅供初步排查参考,实际可用性请人工再次确认,补丁下载验证可使用CVE补丁工具
若补丁不准确,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 反馈正确信息,便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot 计划开始日期设置为2023-02-09 2年前
openeuler-ci-bot 计划截止日期设置为2023-03-11 2年前
openeuler-ci-bot 优先级设置为次要 2年前

该漏洞需要mysql升级到8.0.29解决,mysql-8.0.29版本可能会导致InnoDB表中添加了列的数据被错误地解释,上游已经删除且不可用,需要升级到8.0.30版本;目前20.03-LTS分支gcc版本为7.3.0,升级需要依赖高版本gcc,编译不通过,暂时无法升级解决,暂时挂起
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-29.html

starlet_dx 任务状态待办的 修改为已挂起 2年前
starlet_dx 任务状态已挂起 修改为待办的 8个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
8个月前
openeuler-ci-bot 移除了
 
sig/Others
标签
8个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
8个月前
openeuler-ci-bot 添加了
 
sig/Others
标签
8个月前
wk333-wk333 wk333 成员 8个月前

影响性分析说明:
该漏洞需升级至8.0.29版本修复,20.03-SP4分支采用升级至8.0.38修复,其他分支基线已修复不受影响

受影响版本排查(受影响/不受影响):
1.master:不受影响
2.openEuler-20.03-LTS-SP4:受影响
3.openEuler-22.03-LTS-SP1:不受影响
4.openEuler-22.03-LTS-SP3:不受影响
5.openEuler-24.03-LTS:不受影响
6.openEuler-24.03-LTS-Next:不受影响
7.openEuler-22.03-LTS-SP4:不受影响

修复是否涉及abi变化(是/否):
1.master:否
2.openEuler-20.03-LTS-SP4:否
3.openEuler-22.03-LTS-SP1:否
4.openEuler-22.03-LTS-SP3:否
5.openEuler-24.03-LTS:否
6.openEuler-24.03-LTS-Next:否
7.openEuler-22.03-LTS-SP4:否

openeuler-ci-bot 修改了描述 8个月前
starlet_dx 任务状态待办的 修改为已完成 8个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
8个月前
openeuler-ci-bot 移除了
 
sig/Others
标签
8个月前
openeuler-ci-bot 添加了
 
CVE/FIXED
标签
8个月前
openeuler-ci-bot 添加了
 
sig/Others
标签
8个月前
openeuler-ci-bot 修改了描述 8个月前

登录 后才可以发表评论

状态
负责人
项目
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
预计工期 (小时)
参与者(4)
5329419 openeuler ci bot 1632792936 phluo-phluo wk333-wk333 majun-bot-openMajun_admin
1
https://gitee.com/src-openeuler/mysql.git
git@gitee.com:src-openeuler/mysql.git
src-openeuler
mysql
mysql

搜索帮助