Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-50081 (GCVE-0-2025-50081)
Vulnerability from cvelistv5 – Published: 2025-07-15 19:27 – Updated: 2025-07-16 14:17- Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Cluster accessible data as well as unauthorized read access to a subset of MySQL Cluster accessible data.
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Oracle Corporation | MySQL Cluster |
Affected:
7.6.0 , ≤ 7.6.34
(custom)
Affected: 8.0.0 , ≤ 8.0.42 (custom) Affected: 8.4.0 , ≤ 8.4.5 (custom) Affected: 9.0.0 , ≤ 9.3.0 (custom) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-50081",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-16T14:17:01.473548Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-16T14:17:05.863Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MySQL Cluster",
"vendor": "Oracle Corporation",
"versions": [
{
"lessThanOrEqual": "7.6.34",
"status": "affected",
"version": "7.6.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "8.0.42",
"status": "affected",
"version": "8.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "8.4.5",
"status": "affected",
"version": "8.4.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.0.0",
"versionType": "custom"
}
]
},
{
"product": "MySQL Client",
"vendor": "Oracle Corporation",
"versions": [
{
"lessThanOrEqual": "8.0.42",
"status": "affected",
"version": "8.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "8.4.5",
"status": "affected",
"version": "8.4.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.6.34",
"versionStartIncluding": "7.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.42",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.4.5",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.3.0",
"versionStartIncluding": "9.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_client:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.42",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_client:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.4.5",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_client:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.3.0",
"versionStartIncluding": "9.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Cluster accessible data as well as unauthorized read access to a subset of MySQL Cluster accessible data.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-15T19:27:41.718Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2025-50081",
"datePublished": "2025-07-15T19:27:41.718Z",
"dateReserved": "2025-06-11T22:56:56.111Z",
"dateUpdated": "2025-07-16T14:17:05.863Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-50081\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-16T14:17:01.473548Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"CWE-284 Improper Access Control\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-16T14:16:57.293Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Cluster\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.6.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.6.34\"}, {\"status\": \"affected\", \"version\": \"8.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.0.42\"}, {\"status\": \"affected\", \"version\": \"8.4.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.4.5\"}, {\"status\": \"affected\", \"version\": \"9.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.3.0\"}]}, {\"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Client\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.0.42\"}, {\"status\": \"affected\", \"version\": \"8.4.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.4.5\"}, {\"status\": \"affected\", \"version\": \"9.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.3.0\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpujul2025.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Cluster accessible data as well as unauthorized read access to a subset of MySQL Cluster accessible data.\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"7.6.34\", \"versionStartIncluding\": \"7.6.0\"}, {\"criteria\": \"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"8.0.42\", \"versionStartIncluding\": \"8.0.0\"}, {\"criteria\": \"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"8.4.5\", \"versionStartIncluding\": \"8.4.0\"}, {\"criteria\": \"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"9.3.0\", \"versionStartIncluding\": \"9.0.0\"}, {\"criteria\": \"cpe:2.3:a:oracle:mysql_client:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"8.0.42\", \"versionStartIncluding\": \"8.0.0\"}, {\"criteria\": \"cpe:2.3:a:oracle:mysql_client:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"8.4.5\", \"versionStartIncluding\": \"8.4.0\"}, {\"criteria\": \"cpe:2.3:a:oracle:mysql_client:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"9.3.0\", \"versionStartIncluding\": \"9.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2025-07-15T19:27:41.718Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-50081\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-16T14:17:05.863Z\", \"dateReserved\": \"2025-06-11T22:56:56.111Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2025-07-15T19:27:41.718Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
cve-2025-50081
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
- mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
- mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
- mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
- mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
- mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
- mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
- mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
- mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
- mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
- mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
- mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
- mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
- mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
- mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
- mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
- mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
- mysql: Replication unspecified vulnerability (CPU Jul 2025) (CVE-2025-53023)
- mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
- mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.6.0+3340+d764b636"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.6.0+3340+d764b636"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-17.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic-EUCJP"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-17.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.module_el8.10.0+4049+06e4dcce"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.module_el8.10.0+4049+06e4dcce"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.module_el8.10.0+4049+06e4dcce"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.module_el8.10.0+4049+06e4dcce"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.module_el8.10.0+4049+06e4dcce"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.module_el8.10.0+4049+06e4dcce"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.module_el8.10.0+4049+06e4dcce"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. \n\nSecurity Fix(es): \n\n * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)\n * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)\n * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)\n * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)\n * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)\n * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)\n * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)\n * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)\n * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)\n * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)\n * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)\n * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)\n * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)\n * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)\n * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)\n * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)\n * mysql: Replication unspecified vulnerability (CPU Jul 2025) (CVE-2025-53023)\n * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:16861",
"modified": "2025-10-01T08:52:50Z",
"published": "2025-09-29T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:16861"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21574"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21575"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21577"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21579"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21580"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21584"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21585"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30681"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30682"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30683"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30684"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30685"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30687"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30688"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30689"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30693"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30695"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30696"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30699"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30703"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30704"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30705"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30715"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30721"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30722"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50077"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50078"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50079"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50080"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50081"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50082"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50083"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50084"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50085"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50086"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50087"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50088"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50091"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50092"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50093"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50094"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50096"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50097"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50098"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50099"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50100"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50101"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50102"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50104"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-53023"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359892"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359894"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359895"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359899"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359902"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359903"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359918"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359920"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359924"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359928"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359930"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359932"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359934"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359938"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359940"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359943"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359944"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359945"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359947"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359950"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359963"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359964"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359972"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380264"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380273"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380274"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380278"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380280"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380283"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380290"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380298"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380306"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380308"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380309"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380310"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380311"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380312"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380313"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380320"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380321"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380322"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380326"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380327"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380334"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380335"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2025-16861.html"
}
],
"related": [
"CVE-2025-30722",
"CVE-2025-30688",
"CVE-2025-30699",
"CVE-2025-30721",
"CVE-2025-30682",
"CVE-2025-30683",
"CVE-2025-30715",
"CVE-2025-21574",
"CVE-2025-21585",
"CVE-2025-30681",
"CVE-2025-21577",
"CVE-2025-30687",
"CVE-2025-21580",
"CVE-2025-30696",
"CVE-2025-30705",
"CVE-2025-21575",
"CVE-2025-21579",
"CVE-2025-30685",
"CVE-2025-30704",
"CVE-2025-21581",
"CVE-2025-30689",
"CVE-2025-30695",
"CVE-2025-30703",
"CVE-2025-30693",
"CVE-2025-21584",
"CVE-2025-30684",
"CVE-2025-50092",
"CVE-2025-50081",
"CVE-2025-50079",
"CVE-2025-50077",
"CVE-2025-50078",
"CVE-2025-50091",
"CVE-2025-50101",
"CVE-2025-50093",
"CVE-2025-50099",
"CVE-2025-50085",
"CVE-2025-50086",
"CVE-2025-50082",
"CVE-2025-50097",
"CVE-2025-50104",
"CVE-2025-50087",
"CVE-2025-53023",
"CVE-2025-50080",
"CVE-2025-50088",
"CVE-2025-50083",
"CVE-2025-50084",
"CVE-2025-50100",
"CVE-2025-50094",
"CVE-2025-50098",
"CVE-2025-50096",
"CVE-2025-50102"
],
"summary": "Moderate: mysql:8.0 security update"
}
cve-2025-50081
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
- openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)
- mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
- mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
- mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
- mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
- mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
- mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
- mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
- mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
- mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
- mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
- mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
- mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
- mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
- curl: libcurl: WebSocket endless loop (CVE-2025-5399)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
- mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
- mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
- mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
- mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
- mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
- mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-3.module_el9.6.0+152+8cbce00c.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mecab-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-3.module_el9.6.0+152+8cbce00c.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mecab-ipadic"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-24.module_el9.6.0+152+8cbce00c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mecab-ipadic-EUCJP"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-24.module_el9.6.0+152+8cbce00c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-1.module_el9.6.0+180+a4e757e5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-1.module_el9.6.0+180+a4e757e5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-1.module_el9.6.0+180+a4e757e5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-1.module_el9.6.0+180+a4e757e5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-1.module_el9.6.0+180+a4e757e5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-1.module_el9.6.0+180+a4e757e5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-1.module_el9.6.0+180+a4e757e5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-test-data"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-1.module_el9.6.0+180+a4e757e5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "rapidjson-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.0-19.module_el9.6.0+152+8cbce00c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "rapidjson-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.0-19.module_el9.6.0+152+8cbce00c"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. \n\nSecurity Fix(es): \n\n * openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)\n * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)\n * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)\n * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)\n * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)\n * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)\n * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)\n * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)\n * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)\n * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)\n * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)\n * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)\n * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)\n * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)\n * curl: libcurl: WebSocket endless loop (CVE-2025-5399)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)\n * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)\n * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)\n * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)\n * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)\n * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:16046",
"modified": "2025-09-18T08:40:08Z",
"published": "2025-09-17T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:16046"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-13176"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21574"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21575"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21577"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21579"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21580"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21584"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21585"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21588"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30681"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30682"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30683"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30684"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30685"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30687"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30688"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30689"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30693"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30695"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30696"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30699"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30703"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30704"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30705"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30715"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30721"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30722"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50077"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50078"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50079"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50080"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50081"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50082"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50083"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50084"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50085"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50086"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50087"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50088"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50091"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50092"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50093"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50094"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50096"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50097"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50098"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50099"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50100"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50101"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50102"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50104"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-5399"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359892"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359894"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359895"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359899"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359902"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359903"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359911"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359918"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359920"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359924"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359928"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359930"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359932"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359934"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359938"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359940"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359943"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359944"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359945"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359947"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359950"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359963"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359964"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359972"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2370920"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380264"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380273"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380274"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380278"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380280"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380283"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380290"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380298"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380306"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380308"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380309"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380310"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380312"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380313"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380320"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380321"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380322"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380326"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380327"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380334"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380335"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-16046.html"
}
],
"related": [
"CVE-2024-13176",
"CVE-2025-30722",
"CVE-2025-30688",
"CVE-2025-30699",
"CVE-2025-30721",
"CVE-2025-30682",
"CVE-2025-30683",
"CVE-2025-30715",
"CVE-2025-21574",
"CVE-2025-21585",
"CVE-2025-21588",
"CVE-2025-30681",
"CVE-2025-21577",
"CVE-2025-30687",
"CVE-2025-21580",
"CVE-2025-30696",
"CVE-2025-30705",
"CVE-2025-21575",
"CVE-2025-21579",
"CVE-2025-30685",
"CVE-2025-30704",
"CVE-2025-21581",
"CVE-2025-30689",
"CVE-2025-30695",
"CVE-2025-30703",
"CVE-2025-30693",
"CVE-2025-21584",
"CVE-2025-30684",
"CVE-2025-5399",
"CVE-2025-50092",
"CVE-2025-50081",
"CVE-2025-50079",
"CVE-2025-50077",
"CVE-2025-50078",
"CVE-2025-50091",
"CVE-2025-50101",
"CVE-2025-50093",
"CVE-2025-50099",
"CVE-2025-50085",
"CVE-2025-50086",
"CVE-2025-50082",
"CVE-2025-50097",
"CVE-2025-50104",
"CVE-2025-50087",
"CVE-2025-50080",
"CVE-2025-50088",
"CVE-2025-50083",
"CVE-2025-50084",
"CVE-2025-50100",
"CVE-2025-50094",
"CVE-2025-50098",
"CVE-2025-50096",
"CVE-2025-50102"
],
"summary": "Moderate: mysql:8.4 security update"
}
cve-2025-50081
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
- mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
- mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
- mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
- mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
- mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
- mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
- mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
- mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
- mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
- mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
- mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
- mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
- mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
- mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
- mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
- mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
- mysql: Replication unspecified vulnerability (CPU Jul 2025) (CVE-2025-53023)
- mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
- mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.43-1.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. \n\nSecurity Fix(es): \n\n * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)\n * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)\n * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)\n * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)\n * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)\n * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)\n * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)\n * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)\n * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)\n * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)\n * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)\n * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)\n * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)\n * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)\n * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)\n * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)\n * mysql: Replication unspecified vulnerability (CPU Jul 2025) (CVE-2025-53023)\n * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:16086",
"modified": "2025-09-29T08:50:56Z",
"published": "2025-09-17T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:16086"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21574"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21575"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21577"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21579"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21580"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21584"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21585"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30681"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30682"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30683"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30684"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30685"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30687"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30688"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30689"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30693"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30695"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30696"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30699"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30703"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30704"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30705"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30715"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30721"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30722"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50077"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50078"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50079"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50080"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50081"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50082"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50083"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50084"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50085"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50086"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50087"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50088"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50091"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50092"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50093"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50094"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50096"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50097"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50098"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50099"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50100"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50101"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50102"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50104"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-53023"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359892"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359894"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359895"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359899"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359902"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359903"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359918"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359920"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359924"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359928"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359930"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359932"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359934"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359938"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359940"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359943"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359944"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359945"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359947"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359950"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359963"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359964"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359972"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380264"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380273"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380274"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380278"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380280"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380283"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380290"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380298"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380306"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380308"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380309"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380310"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380311"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380312"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380313"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380320"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380321"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380322"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380326"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380327"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380334"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380335"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-16086.html"
}
],
"related": [
"CVE-2025-30722",
"CVE-2025-30688",
"CVE-2025-30699",
"CVE-2025-30721",
"CVE-2025-30682",
"CVE-2025-30683",
"CVE-2025-30715",
"CVE-2025-21574",
"CVE-2025-21585",
"CVE-2025-30681",
"CVE-2025-21577",
"CVE-2025-30687",
"CVE-2025-21580",
"CVE-2025-30696",
"CVE-2025-30705",
"CVE-2025-21575",
"CVE-2025-21579",
"CVE-2025-30685",
"CVE-2025-30704",
"CVE-2025-21581",
"CVE-2025-30689",
"CVE-2025-30695",
"CVE-2025-30703",
"CVE-2025-30693",
"CVE-2025-21584",
"CVE-2025-30684",
"CVE-2025-50092",
"CVE-2025-50081",
"CVE-2025-50079",
"CVE-2025-50077",
"CVE-2025-50078",
"CVE-2025-50091",
"CVE-2025-50101",
"CVE-2025-50093",
"CVE-2025-50099",
"CVE-2025-50085",
"CVE-2025-50086",
"CVE-2025-50082",
"CVE-2025-50097",
"CVE-2025-50104",
"CVE-2025-50087",
"CVE-2025-53023",
"CVE-2025-50080",
"CVE-2025-50088",
"CVE-2025-50083",
"CVE-2025-50084",
"CVE-2025-50100",
"CVE-2025-50094",
"CVE-2025-50098",
"CVE-2025-50096",
"CVE-2025-50102"
],
"summary": "Moderate: mysql security update"
}
cve-2025-50081
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files.
Security Fix(es):
- openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)
- mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
- mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
- mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
- mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
- mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
- mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
- mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
- mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
- mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
- mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
- mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
- mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
- mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
- mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
- mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
- mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
- curl: libcurl: WebSocket endless loop (CVE-2025-5399)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
- mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
- mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
- mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
- mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
- mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
- mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
- mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
- mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
- mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "mysql-selinux"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.14-1.el10_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "mysql8.4-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-2.el10_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "mysql8.4-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-2.el10_0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "mysql8.4-test-data"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.4.6-2.el10_0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. \n\nSecurity Fix(es): \n\n * openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)\n * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)\n * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)\n * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)\n * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)\n * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)\n * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)\n * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)\n * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)\n * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)\n * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)\n * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)\n * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)\n * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)\n * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)\n * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)\n * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)\n * curl: libcurl: WebSocket endless loop (CVE-2025-5399)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)\n * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)\n * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)\n * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)\n * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)\n * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)\n * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)\n * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)\n * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:15699",
"modified": "2025-09-12T10:30:08Z",
"published": "2025-09-11T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:15699"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-13176"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21574"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21575"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21577"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21579"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21580"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21581"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21584"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21585"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21588"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30681"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30682"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30683"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30684"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30685"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30687"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30688"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30689"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30693"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30695"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30696"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30699"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30703"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30704"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30705"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30715"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30721"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-30722"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50077"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50078"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50079"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50080"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50081"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50082"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50083"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50084"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50085"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50086"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50087"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50088"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50091"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50092"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50093"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50094"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50096"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50097"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50098"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50099"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50100"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50101"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50102"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-50104"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-5399"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359892"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359894"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359895"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359899"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359902"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359903"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359911"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359918"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359920"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359924"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359928"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359930"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359932"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359934"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359938"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359940"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359943"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359944"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359945"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359947"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359950"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359963"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359964"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2359972"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2370920"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380264"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380273"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380274"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380278"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380280"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380283"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380290"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380298"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380306"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380308"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380309"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380310"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380312"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380313"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380320"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380321"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380322"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380326"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380327"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380334"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2380335"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2025-15699.html"
}
],
"related": [
"CVE-2024-13176",
"CVE-2025-30722",
"CVE-2025-30688",
"CVE-2025-30699",
"CVE-2025-30721",
"CVE-2025-30682",
"CVE-2025-30683",
"CVE-2025-30715",
"CVE-2025-21574",
"CVE-2025-21585",
"CVE-2025-21588",
"CVE-2025-30681",
"CVE-2025-21577",
"CVE-2025-30687",
"CVE-2025-21580",
"CVE-2025-30696",
"CVE-2025-30705",
"CVE-2025-21575",
"CVE-2025-21579",
"CVE-2025-30685",
"CVE-2025-30704",
"CVE-2025-21581",
"CVE-2025-30689",
"CVE-2025-30695",
"CVE-2025-30703",
"CVE-2025-30693",
"CVE-2025-21584",
"CVE-2025-30684",
"CVE-2025-5399",
"CVE-2025-50092",
"CVE-2025-50081",
"CVE-2025-50079",
"CVE-2025-50077",
"CVE-2025-50078",
"CVE-2025-50091",
"CVE-2025-50101",
"CVE-2025-50093",
"CVE-2025-50099",
"CVE-2025-50085",
"CVE-2025-50086",
"CVE-2025-50082",
"CVE-2025-50097",
"CVE-2025-50104",
"CVE-2025-50087",
"CVE-2025-50080",
"CVE-2025-50088",
"CVE-2025-50083",
"CVE-2025-50084",
"CVE-2025-50100",
"CVE-2025-50094",
"CVE-2025-50098",
"CVE-2025-50096",
"CVE-2025-50102"
],
"summary": "Moderate: mysql-selinux and mysql8.4 security update"
}
GHSA-RM7F-F74M-5FJV
Vulnerability from github – Published: 2025-07-15 21:31 – Updated: 2025-07-15 21:31Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N).
{
"affected": [],
"aliases": [
"CVE-2025-50081"
],
"database_specific": {
"cwe_ids": [
"CWE-284"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-15T20:15:43Z",
"severity": "LOW"
},
"details": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N).",
"id": "GHSA-rm7f-f74m-5fjv",
"modified": "2025-07-15T21:31:41Z",
"published": "2025-07-15T21:31:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50081"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
CERTFR-2025-AVI-0601
Vulnerability from certfr_avis - Published: 2025-07-18 - Updated: 2025-07-18
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Cluster versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Client versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 7.6.0 à 7.6.34 | ||
| Oracle | MySQL | MySQL Cluster versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.0 à 8.0.42 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.6.0 \u00e0 7.6.34",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-50089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50089"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2025-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53032"
},
{
"name": "CVE-2025-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50076"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2025-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50095"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2025-50068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50068"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2025-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50081"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50103"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2025-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
}
],
"initial_release_date": "2025-07-18T00:00:00",
"last_revision_date": "2025-07-18T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0601",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujul2025",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
FKIE_CVE-2025-50081
Vulnerability from fkie_nvd - Published: 2025-07-15 20:15 - Updated: 2025-07-17 12:30| URL | Tags | ||
|---|---|---|---|
| secalert_us@oracle.com | https://www.oracle.com/security-alerts/cpujul2025.html | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4943FB62-574B-4986-9DCB-79B34B63029B",
"versionEndIncluding": "8.0.42",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57E4C297-30F7-445B-8663-CA332B6E4914",
"versionEndIncluding": "8.4.5",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD3ED8B-5060-4228-A4F7-F01C090D034B",
"versionEndIncluding": "9.3.0",
"versionStartIncluding": "9.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto MySQL Client de Oracle MySQL (componente: Cliente: mysqldump). Las versiones compatibles afectadas son 8.0.0-8.0.42, 8.4.0-8.4.5 y 9.0.0-9.3.0. Esta vulnerabilidad, dif\u00edcil de explotar, permite a un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometer el MySQL Client. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta al atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserciones o eliminaciones de datos accesibles del MySQL Client as\u00ed como acceso no autorizado a lecturas de un subconjunto de dichos datos. Puntuaci\u00f3n base CVSS 3.1: 3.1 (Afecta a la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N)."
}
],
"id": "CVE-2025-50081",
"lastModified": "2025-07-17T12:30:54.713",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 2.5,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2025-07-15T20:15:43.840",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CNVD-2025-17163
Vulnerability from cnvd - Published: 2025-07-30厂商已发布了漏洞修复程序,请及时关注更新: https://www.oracle.com/security-alerts/cpujul2025.html
| Name | ['Oracle MySQL Client >=8.0.0,<=8.0.42', 'Oracle MySQL Client >=8.4.0,<=8.4.5', 'Oracle MySQL Client >=9.0.0,<=9.3.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-50081",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-50081"
}
},
"description": "Oracle MySQL\u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002MySQL Client\u662fMySQL\u5ba2\u6237\u7aef\uff0c\u662f\u7528\u4e8e\u4e0e\u670d\u52a1\u5668\u901a\u4fe1\u4ee5\u5904\u7406\u670d\u52a1\u5668\u7ba1\u7406\u7684\u6570\u636e\u5e93\u4e2d\u7684\u4fe1\u606f\u7684\u7a0b\u5e8f\u3002\n\nOracle MySQL\u7684MySQL Client 8.0.0\u81f38.0.42\u7248\u672c\u30018.4.0\u81f38.4.5\u7248\u672c\u548c9.0.0\u81f39.3.0\u7248\u672c\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8emysqldump\u7ec4\u4ef6\u8bbf\u95ee\u63a7\u5236\u4e0d\u5f53\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6570\u636e\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u6216\u4fee\u6539\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.oracle.com/security-alerts/cpujul2025.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-17163",
"openTime": "2025-07-30",
"patchDescription": "Oracle MySQL\u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002MySQL Client\u662fMySQL\u5ba2\u6237\u7aef\uff0c\u662f\u7528\u4e8e\u4e0e\u670d\u52a1\u5668\u901a\u4fe1\u4ee5\u5904\u7406\u670d\u52a1\u5668\u7ba1\u7406\u7684\u6570\u636e\u5e93\u4e2d\u7684\u4fe1\u606f\u7684\u7a0b\u5e8f\u3002\r\n\r\nOracle MySQL\u7684MySQL Client 8.0.0\u81f38.0.42\u7248\u672c\u30018.4.0\u81f38.4.5\u7248\u672c\u548c9.0.0\u81f39.3.0\u7248\u672c\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8emysqldump\u7ec4\u4ef6\u8bbf\u95ee\u63a7\u5236\u4e0d\u5f53\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6570\u636e\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u6216\u4fee\u6539\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle MySQL Client \u003e=8.0.0\uff0c\u003c=8.0.42",
"Oracle MySQL Client \u003e=8.4.0\uff0c\u003c=8.4.5",
"Oracle MySQL Client \u003e=9.0.0\uff0c\u003c=9.3.0"
]
},
"referenceLink": "https://www.oracle.com/security-alerts/cpujul2025.html",
"serverity": "\u4f4e",
"submitTime": "2025-07-21",
"title": "Oracle MySQL\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e"
}
CVE-2025-50081
Vulnerability from fstec - Published: 15.07.2025{
"CVSS 2.0": "AV:N/AC:H/Au:S/C:P/I:P/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"CVSS 4.0": "AV:N/AC:L/AT:P/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear",
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 8.0.0 \u0434\u043e 8.0.42 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Client), \u043e\u0442 8.4.0 \u0434\u043e 8.4.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Client), \u043e\u0442 9.0.0 \u0434\u043e 9.3.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Client), \u043e\u0442 7.6.0 \u0434\u043e 7.6.34 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Cluster), \u043e\u0442 8.0.0 \u0434\u043e 8.0.42 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Cluster), \u043e\u0442 8.4.0 \u0434\u043e 8.4.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Cluster), \u043e\u0442 9.0.0 \u0434\u043e 9.3.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Cluster)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.oracle.com/security-alerts/cpujul2025.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.07.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-08654",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-50081",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "MySQL Client, MySQL Cluster",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Cluster: General \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 MySQL Cluster, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043d\u0430 \u0447\u0442\u0435\u043d\u0438\u0435, \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (CWE-284)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Cluster: General \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 MySQL Cluster \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043d\u0430 \u0447\u0442\u0435\u043d\u0438\u0435, \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 MySQL",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "\u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 Cluster: General \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 MySQL Cluster \u0438 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 Client: mysqldump \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 MySQL Client.",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.oracle.com/security-alerts/cpujul2025.html\nhttps://www.cybersecurity-help.cz/vdb/SB2025071680",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0423\u0411\u0414, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-284",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,6)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,1)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 0,2)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.