ID

VAR-201904-0029


CVE

CVE-2019-2686


TITLE

Oracle MySQL of MySQL Server In Server: Optimizer Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2019-003631

DESCRIPTION

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). Oracle MySQL is an open source relational database management system from Oracle Corporation of the United States. An attacker could use this vulnerability to cause a denial of service (hang or frequent crashes), affecting the availability of data. These vulnerabilities can be exploited over 'MySQL Protocol' protocol. 8) - aarch64, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: rh-mysql80-mysql security update Advisory ID: RHSA-2019:2484-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2019:2484 Issue date: 2019-08-14 CVE Names: CVE-2019-2420 CVE-2019-2434 CVE-2019-2436 CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 CVE-2019-2486 CVE-2019-2494 CVE-2019-2495 CVE-2019-2502 CVE-2019-2503 CVE-2019-2507 CVE-2019-2510 CVE-2019-2528 CVE-2019-2529 CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 CVE-2019-2580 CVE-2019-2581 CVE-2019-2584 CVE-2019-2585 CVE-2019-2587 CVE-2019-2589 CVE-2019-2592 CVE-2019-2593 CVE-2019-2596 CVE-2019-2606 CVE-2019-2607 CVE-2019-2614 CVE-2019-2617 CVE-2019-2620 CVE-2019-2623 CVE-2019-2624 CVE-2019-2625 CVE-2019-2626 CVE-2019-2627 CVE-2019-2628 CVE-2019-2630 CVE-2019-2631 CVE-2019-2634 CVE-2019-2635 CVE-2019-2636 CVE-2019-2644 CVE-2019-2681 CVE-2019-2683 CVE-2019-2685 CVE-2019-2686 CVE-2019-2687 CVE-2019-2688 CVE-2019-2689 CVE-2019-2691 CVE-2019-2693 CVE-2019-2694 CVE-2019-2695 CVE-2019-2737 CVE-2019-2738 CVE-2019-2739 CVE-2019-2740 CVE-2019-2752 CVE-2019-2755 CVE-2019-2757 CVE-2019-2758 CVE-2019-2774 CVE-2019-2778 CVE-2019-2780 CVE-2019-2784 CVE-2019-2785 CVE-2019-2789 CVE-2019-2795 CVE-2019-2796 CVE-2019-2797 CVE-2019-2798 CVE-2019-2800 CVE-2019-2801 CVE-2019-2802 CVE-2019-2803 CVE-2019-2805 CVE-2019-2808 CVE-2019-2810 CVE-2019-2811 CVE-2019-2812 CVE-2019-2814 CVE-2019-2815 CVE-2019-2819 CVE-2019-2826 CVE-2019-2830 CVE-2019-2834 CVE-2019-2879 ===================================================================== 1. Summary: An update for rh-mysql80-mysql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. The following packages have been upgraded to a later upstream version: rh-mysql80-mysql (8.0.17). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the MySQL server daemon (mysqld) will be restarted automatically. 5. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm aarch64: rh-mysql80-mysql-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.aarch64.rpm ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm aarch64: rh-mysql80-mysql-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.aarch64.rpm ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4): Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5): Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6): Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7): Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-2420 https://access.redhat.com/security/cve/CVE-2019-2434 https://access.redhat.com/security/cve/CVE-2019-2436 https://access.redhat.com/security/cve/CVE-2019-2455 https://access.redhat.com/security/cve/CVE-2019-2481 https://access.redhat.com/security/cve/CVE-2019-2482 https://access.redhat.com/security/cve/CVE-2019-2486 https://access.redhat.com/security/cve/CVE-2019-2494 https://access.redhat.com/security/cve/CVE-2019-2495 https://access.redhat.com/security/cve/CVE-2019-2502 https://access.redhat.com/security/cve/CVE-2019-2503 https://access.redhat.com/security/cve/CVE-2019-2507 https://access.redhat.com/security/cve/CVE-2019-2510 https://access.redhat.com/security/cve/CVE-2019-2528 https://access.redhat.com/security/cve/CVE-2019-2529 https://access.redhat.com/security/cve/CVE-2019-2530 https://access.redhat.com/security/cve/CVE-2019-2531 https://access.redhat.com/security/cve/CVE-2019-2532 https://access.redhat.com/security/cve/CVE-2019-2533 https://access.redhat.com/security/cve/CVE-2019-2534 https://access.redhat.com/security/cve/CVE-2019-2535 https://access.redhat.com/security/cve/CVE-2019-2536 https://access.redhat.com/security/cve/CVE-2019-2537 https://access.redhat.com/security/cve/CVE-2019-2539 https://access.redhat.com/security/cve/CVE-2019-2580 https://access.redhat.com/security/cve/CVE-2019-2581 https://access.redhat.com/security/cve/CVE-2019-2584 https://access.redhat.com/security/cve/CVE-2019-2585 https://access.redhat.com/security/cve/CVE-2019-2587 https://access.redhat.com/security/cve/CVE-2019-2589 https://access.redhat.com/security/cve/CVE-2019-2592 https://access.redhat.com/security/cve/CVE-2019-2593 https://access.redhat.com/security/cve/CVE-2019-2596 https://access.redhat.com/security/cve/CVE-2019-2606 https://access.redhat.com/security/cve/CVE-2019-2607 https://access.redhat.com/security/cve/CVE-2019-2614 https://access.redhat.com/security/cve/CVE-2019-2617 https://access.redhat.com/security/cve/CVE-2019-2620 https://access.redhat.com/security/cve/CVE-2019-2623 https://access.redhat.com/security/cve/CVE-2019-2624 https://access.redhat.com/security/cve/CVE-2019-2625 https://access.redhat.com/security/cve/CVE-2019-2626 https://access.redhat.com/security/cve/CVE-2019-2627 https://access.redhat.com/security/cve/CVE-2019-2628 https://access.redhat.com/security/cve/CVE-2019-2630 https://access.redhat.com/security/cve/CVE-2019-2631 https://access.redhat.com/security/cve/CVE-2019-2634 https://access.redhat.com/security/cve/CVE-2019-2635 https://access.redhat.com/security/cve/CVE-2019-2636 https://access.redhat.com/security/cve/CVE-2019-2644 https://access.redhat.com/security/cve/CVE-2019-2681 https://access.redhat.com/security/cve/CVE-2019-2683 https://access.redhat.com/security/cve/CVE-2019-2685 https://access.redhat.com/security/cve/CVE-2019-2686 https://access.redhat.com/security/cve/CVE-2019-2687 https://access.redhat.com/security/cve/CVE-2019-2688 https://access.redhat.com/security/cve/CVE-2019-2689 https://access.redhat.com/security/cve/CVE-2019-2691 https://access.redhat.com/security/cve/CVE-2019-2693 https://access.redhat.com/security/cve/CVE-2019-2694 https://access.redhat.com/security/cve/CVE-2019-2695 https://access.redhat.com/security/cve/CVE-2019-2737 https://access.redhat.com/security/cve/CVE-2019-2738 https://access.redhat.com/security/cve/CVE-2019-2739 https://access.redhat.com/security/cve/CVE-2019-2740 https://access.redhat.com/security/cve/CVE-2019-2752 https://access.redhat.com/security/cve/CVE-2019-2755 https://access.redhat.com/security/cve/CVE-2019-2757 https://access.redhat.com/security/cve/CVE-2019-2758 https://access.redhat.com/security/cve/CVE-2019-2774 https://access.redhat.com/security/cve/CVE-2019-2778 https://access.redhat.com/security/cve/CVE-2019-2780 https://access.redhat.com/security/cve/CVE-2019-2784 https://access.redhat.com/security/cve/CVE-2019-2785 https://access.redhat.com/security/cve/CVE-2019-2789 https://access.redhat.com/security/cve/CVE-2019-2795 https://access.redhat.com/security/cve/CVE-2019-2796 https://access.redhat.com/security/cve/CVE-2019-2797 https://access.redhat.com/security/cve/CVE-2019-2798 https://access.redhat.com/security/cve/CVE-2019-2800 https://access.redhat.com/security/cve/CVE-2019-2801 https://access.redhat.com/security/cve/CVE-2019-2802 https://access.redhat.com/security/cve/CVE-2019-2803 https://access.redhat.com/security/cve/CVE-2019-2805 https://access.redhat.com/security/cve/CVE-2019-2808 https://access.redhat.com/security/cve/CVE-2019-2810 https://access.redhat.com/security/cve/CVE-2019-2811 https://access.redhat.com/security/cve/CVE-2019-2812 https://access.redhat.com/security/cve/CVE-2019-2814 https://access.redhat.com/security/cve/CVE-2019-2815 https://access.redhat.com/security/cve/CVE-2019-2819 https://access.redhat.com/security/cve/CVE-2019-2826 https://access.redhat.com/security/cve/CVE-2019-2830 https://access.redhat.com/security/cve/CVE-2019-2834 https://access.redhat.com/security/cve/CVE-2019-2879 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXVOxPNzjgjWX9erEAQjMXA/9Eihmyr36juKBY8YJ6hqFuMlWDEtXH/uI /6z1r6cjHcLr4FU+qbt/q8lqQ/mKFBrfYgPrZe6RugoC52B4U4Zkt78Vy0WH4uFJ dh2C6eR2IwFp/avJD3m8vaDTL6aHHXOYSiGJCegg5kjmZyXMWHgI6/bVhprwy1k8 +IXNSF9L87Ww/4teTv7L1eKchstpzZd+7V+ZS6JeaD1Cxu6vYV+Nrbo/J3362h1K 3Zf/aromzPBEl9XXzmqJawN/t1twTp2XAhV8is4FzkQ0XAy/0IoFc/GP34MHYZ2R vwyeVehCmwtHBH8JrViQGE5HgeaE8fs7g3DqIefJmswB+NsYvw1rybPtgOhpew+W MIZaKrzFuiYIl3VQMR5VT2ZVerwglle1uP2x/gYvm4LZsqfdJcwBCFiJhDITQ2cw ZKdlBAs3MJtkJJpWn1kAIKcblmUXU4LRZkJtIH+VBpr0NLQVGwJ2UG93jD7Y74tI 3AH1YAaKHXuAjlpDw4qcWQsPnbegPaWesffkNty6+aLdt4y8nJ8IQWm5aMqSU5xW +6MQ9sf2qIRLYj+RFtNQJP+K0sK32DJjtrZuLDWD2Fhg9w9XG6SZxuSTxfVstBqi M42OspadVMdFto1IQuv9/9I7cS9l5srfVnjq7kO6yuENIm7/tJX+tjU4jagbfZ3L zLIpZwaofO8= =dahN -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.61

sources: NVD: CVE-2019-2686 // JVNDB: JVNDB-2019-003631 // CNVD: CNVD-2019-11756 // BID: 107913 // PACKETSTORM: 154103 // PACKETSTORM: 154060

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-11756

AFFECTED PRODUCTS

vendor:oraclemodel:mysqlscope:lteversion:8.0.15

Trust: 1.8

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:oraclemodel:mysqlscope:gteversion:8.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.6

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:software collectionsscope:eqversion:1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.6

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.6

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.4

Trust: 1.0

vendor:oraclemodel:mysql serverscope:lteversion:<=8.0.15

Trust: 0.6

vendor:oraclemodel:mysql serverscope:eqversion:8.0.15

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:8.0.14

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:8.0.13

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:8.0.12

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:8.0.11

Trust: 0.3

sources: CNVD: CNVD-2019-11756 // BID: 107913 // JVNDB: JVNDB-2019-003631 // NVD: CVE-2019-2686

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-2686
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-2686
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-11756
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201904-674
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2019-2686
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-11756
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-2686
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-2686
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-11756 // JVNDB: JVNDB-2019-003631 // CNNVD: CNNVD-201904-674 // NVD: CVE-2019-2686

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-20

Trust: 0.8

sources: JVNDB: JVNDB-2019-003631 // NVD: CVE-2019-2686

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201904-674

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201904-674

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003631

PATCH

title:Oracle Critical Patch Update Advisory - April 2019url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - April 2019 Risk Matricesurl:https://www.oracle.com/technetwork/security-advisory/cpuapr2019verbose-5072824.html

Trust: 0.8

title:Patch for Oracle MySQL Server Denial of Service Vulnerability (CNVD-2019-11756)url:https://www.cnvd.org.cn/patchInfo/show/159291

Trust: 0.6

title:Oracle MySQL Server Fixes for component security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=91472

Trust: 0.6

sources: CNVD: CNVD-2019-11756 // JVNDB: JVNDB-2019-003631 // CNNVD: CNNVD-201904-674

EXTERNAL IDS

db:NVDid:CVE-2019-2686

Trust: 3.5

db:BIDid:107913

Trust: 0.9

db:JVNDBid:JVNDB-2019-003631

Trust: 0.8

db:CNVDid:CNVD-2019-11756

Trust: 0.6

db:AUSCERTid:ESB-2019.3142

Trust: 0.6

db:CNNVDid:CNNVD-201904-674

Trust: 0.6

db:PACKETSTORMid:154103

Trust: 0.1

db:PACKETSTORMid:154060

Trust: 0.1

sources: CNVD: CNVD-2019-11756 // BID: 107913 // JVNDB: JVNDB-2019-003631 // PACKETSTORM: 154103 // PACKETSTORM: 154060 // CNNVD: CNNVD-201904-674 // NVD: CVE-2019-2686

REFERENCES

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 2.5

url:https://access.redhat.com/errata/rhsa-2019:2511

Trust: 2.3

url:https://access.redhat.com/errata/rhsa-2019:2484

Trust: 1.7

url:https://support.f5.com/csp/article/k28312671

Trust: 1.6

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019verbose-5072824.html

Trust: 1.2

url:http://www.oracle.com/index.html

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2686

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-2686

Trust: 0.8

url:https://www.securityfocus.com/bid/107913

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3142/

Trust: 0.6

url:https://vigilance.fr/vulnerability/oracle-mysql-vulnerabilities-of-april-2019-29050

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-is-potentially-impacted-by-vulnerabilities-in-mysql/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-2581

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2533

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2830

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2686

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2635

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2785

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2507

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2539

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2530

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2537

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2536

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2688

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2503

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2620

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2631

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2539

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2752

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2607

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2826

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2627

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2495

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2528

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2528

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2614

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2757

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2801

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2758

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2529

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2797

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2798

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2587

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2482

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2503

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2510

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2534

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2532

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2628

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2695

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2803

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2481

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2800

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2581

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2584

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2805

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2537

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2737

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2811

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2592

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2815

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2683

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2420

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2593

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2530

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2623

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2481

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2436

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2624

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2486

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2495

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2739

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2494

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2494

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2625

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2644

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2810

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2834

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2534

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2689

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2617

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2585

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2755

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2694

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2819

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2529

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2740

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2796

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2691

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2585

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2626

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2738

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2584

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2580

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2486

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2802

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2535

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2681

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2502

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2531

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2420

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2455

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2774

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2535

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2808

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2455

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2630

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2502

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2434

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2533

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2778

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2685

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2634

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2532

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2510

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2789

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2507

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2531

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2536

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2784

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2636

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2879

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2589

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2482

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2596

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2434

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2795

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2814

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2812

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2606

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2436

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2687

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2580

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2693

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2780

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

sources: CNVD: CNVD-2019-11756 // BID: 107913 // JVNDB: JVNDB-2019-003631 // PACKETSTORM: 154103 // PACKETSTORM: 154060 // CNNVD: CNNVD-201904-674 // NVD: CVE-2019-2686

CREDITS

Oracle

Trust: 0.9

sources: BID: 107913 // CNNVD: CNNVD-201904-674

SOURCES

db:CNVDid:CNVD-2019-11756
db:BIDid:107913
db:JVNDBid:JVNDB-2019-003631
db:PACKETSTORMid:154103
db:PACKETSTORMid:154060
db:CNNVDid:CNNVD-201904-674
db:NVDid:CVE-2019-2686

LAST UPDATE DATE

2024-08-14T12:17:16.597000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-11756date:2019-04-22T00:00:00
db:BIDid:107913date:2019-04-16T00:00:00
db:JVNDBid:JVNDB-2019-003631date:2019-05-21T00:00:00
db:CNNVDid:CNNVD-201904-674date:2023-02-01T00:00:00
db:NVDid:CVE-2019-2686date:2023-01-30T15:46:55.587

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-11756date:2019-04-22T00:00:00
db:BIDid:107913date:2019-04-16T00:00:00
db:JVNDBid:JVNDB-2019-003631date:2019-05-21T00:00:00
db:PACKETSTORMid:154103date:2019-08-15T22:30:31
db:PACKETSTORMid:154060date:2019-08-14T23:03:33
db:CNNVDid:CNNVD-201904-674date:2019-04-16T00:00:00
db:NVDid:CVE-2019-2686date:2019-04-23T19:32:55.553