6 Star 0 Fork 23

src-openEuler/mysql5

CVE-2025-21529

待办的
CVE和安全问题
创建于  
2025-01-22 08:36

一、漏洞信息
漏洞编号:CVE-2025-21529
漏洞归属组件:mysql5
漏洞归属的版本:5.7.21,5.7.34,5.7.38,5.7.39,5.7.43,5.7.44
CVSS V3.0分值:
BaseScore:4.9 Medium
Vector:CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
漏洞简述:
A vulnerability was found in Oracle MySQL Server up to 8.0.40/8.4.3/9.1.0 (Database Software). It has been rated as critical.Using CWE to declare the problem leads to CWE-285. The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.Impacted is availability.Upgrading eliminates this vulnerability.
漏洞公开时间:2025-01-22 05:15:18
漏洞创建时间:2025-01-22 08:36:02
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2025-21529

更多参考(点击展开)
参考来源 参考链接 来源链接
https://www.oracle.com/security-alerts/cpujan2025.html
https://nvd.nist.gov/vuln/detail/CVE-2025-21529
https://www.cve.org/CVERecord?id=CVE-2025-21529
https://nvd.nist.gov/vuln/detail/CVE-2025-21529
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
https://bugzilla.redhat.com/show_bug.cgi?id=2339226
https://security-tracker.debian.org/tracker/CVE-2025-21529
http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-21529
https://bugzilla.redhat.com/show_bug.cgi?id=2339226
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21529
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/errata/RHSA-2025:1673
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/errata/RHSA-2025:1673
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/errata/RHSA-2025:1673
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/errata/RHSA-2025:1673
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/errata/RHSA-2025:1673
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/errata/RHSA-2025:1673
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/errata/RHSA-2025:1673
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://linux.oracle.com/cve/CVE-2025-21529.html
https://linux.oracle.com/errata/ELSA-2025-1671.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529
https://ubuntu.com/security/CVE-2025-21529
https://www.cve.org/CVERecord?id=CVE-2025-21529
https://www.oracle.com/security-alerts/cpujan2025.html
https://ubuntu.com/security/notices/USN-7245-1
https://bugzilla.redhat.com/show_bug.cgi?id=2339226
https://access.redhat.com/security/cve/CVE-2025-21529
https://www.oracle.com/security-alerts/cpujan2025.html

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:

详情(点击展开)

二、漏洞分析结构反馈
影响性分析说明:

openEuler评分:
4.9
Vector:CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.master(5.7.43):
2.openEuler-20.03-LTS-SP4(5.7.44):
3.openEuler-22.03-LTS-SP3(5.7.44):
4.openEuler-22.03-LTS-SP4(5.7.44):
5.openEuler-24.03-LTS(5.7.43):
6.openEuler-24.03-LTS-Next(5.7.43):
7.openEuler-24.03-LTS-SP1:

修复是否涉及abi变化(是/否):
1.master(5.7.43):
2.openEuler-20.03-LTS-SP4(5.7.44):
3.openEuler-22.03-LTS-SP3(5.7.44):
4.openEuler-22.03-LTS-SP4(5.7.44):
5.openEuler-24.03-LTS(5.7.43):
6.openEuler-24.03-LTS-Next(5.7.43):
7.openEuler-24.03-LTS-SP1:

原因说明:
1.master(5.7.43):
2.openEuler-20.03-LTS-SP4(5.7.44):
3.openEuler-22.03-LTS-SP3(5.7.44):
4.openEuler-22.03-LTS-SP4(5.7.44):
5.openEuler-24.03-LTS(5.7.43):
6.openEuler-24.03-LTS-Next(5.7.43):
7.openEuler-24.03-LTS-SP1:

评论 (3)

majun-bot 创建了CVE和安全问题 5个月前
majun-bot 添加了
 
CVE/UNFIXED
标签
5个月前
展开全部操作日志
openeuler-ci-bot 添加了
 
sig/DB
标签
5个月前
参考网址 关联pr 状态 补丁链接
https://nvd.nist.gov/vuln/detail/CVE-2025-21529
https://ubuntu.com/security/CVE-2025-21529NoneNonehttps://discourse.ubuntu.com/c/project
https://www.opencve.io/cve/CVE-2025-21529
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2025-21529

说明:补丁链接仅供初步排查参考,实际可用性请人工再次确认,补丁下载验证可使用CVE补丁工具
若补丁不准确,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 反馈正确信息,便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot 修改了描述 5个月前
openeuler-ci-bot 修改了描述 5个月前
openeuler-ci-bot 计划开始日期设置为2025-01-22 5个月前
openeuler-ci-bot 计划截止日期设置为2025-02-21 5个月前
openeuler-ci-bot 优先级设置为次要 5个月前
openeuler-ci-bot 修改了描述 5个月前
openeuler-ci-bot 计划开始日期2025-01-22 修改为2025-01-23 5个月前
openeuler-ci-bot 计划截止日期2025-02-21 修改为2025-02-22 5个月前
openeuler-ci-bot 计划开始日期2025-01-23 修改为2025-02-01 5个月前
openeuler-ci-bot 计划截止日期2025-02-22 修改为2025-03-03 5个月前
openeuler-ci-bot 修改了描述 5个月前
openeuler-ci-bot 修改了描述 5个月前
openeuler-ci-bot 修改了描述 5个月前
openeuler-ci-bot 修改了描述 4个月前
openeuler-ci-bot 修改了描述 4个月前
openeuler-ci-bot 修改了描述 3个月前
openeuler-ci-bot 修改了描述 20天前
openeuler-ci-bot 修改了描述 20天前
openeuler-ci-bot 修改了描述 6小时前

登录 后才可以发表评论

状态
负责人
项目
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
里程碑
分支
参与者(2)
5329419 openeuler ci bot 1632792936 majun-bot-openMajun_admin
1
https://gitee.com/src-openeuler/mysql5.git
git@gitee.com:src-openeuler/mysql5.git
src-openeuler
mysql5
mysql5

搜索帮助