{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"MEDIUM"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2374"
			},
			{
				"summary":"CVE-2021-2374 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2021/csaf-openeuler-cve-2021-2374.json"
			},
			{
				"summary":"openEuler-SA-2021-1375",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1375"
			},
			{
				"summary":"CVE-2021-2374",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2021-2374&packageName=mysql"
			}
		],
		"title":"openEuler cve CVE-2021-2374",
		"tracking":{
			"initial_release_date":"2021-10-08T09:22:47+08:00",
			"revision_history":[
				{
					"date":"2021-10-08T09:22:47+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:22:47+08:00",
					"summary":"Current version",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:22:47+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:22:47+08:00",
			"id":"CVE-2021-2374",
			"version":"2.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"openEuler-20.03-LTS-SP1",
									"name":"openEuler-20.03-LTS-SP1"
								},
								"name":"openEuler-20.03-LTS-SP1",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP2"
									},
									"product_id":"openEuler-20.03-LTS-SP2",
									"name":"openEuler-20.03-LTS-SP2"
								},
								"name":"openEuler-20.03-LTS-SP2",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"mysql-8.0.26-1.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"mysql-8.0.26-1.oe1.aarch64.rpm"
								},
								"name":"mysql-8.0.26-1.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP2"
									},
									"product_id":"mysql-8.0.26-1.oe1.aarch64.rpm(20.03-LTS-SP2)",
									"name":"mysql-8.0.26-1.oe1.aarch64.rpm"
								},
								"name":"mysql-8.0.26-1.oe1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"mysql-8.0.26-1.oe1.src.rpm(20.03-LTS-SP1)",
									"name":"mysql-8.0.26-1.oe1.src.rpm"
								},
								"name":"mysql-8.0.26-1.oe1.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP2"
									},
									"product_id":"mysql-8.0.26-1.oe1.src.rpm(20.03-LTS-SP2)",
									"name":"mysql-8.0.26-1.oe1.src.rpm"
								},
								"name":"mysql-8.0.26-1.oe1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"mysql-8.0.26-1.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"mysql-8.0.26-1.oe1.x86_64.rpm"
								},
								"name":"mysql-8.0.26-1.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP2"
									},
									"product_id":"mysql-8.0.26-1.oe1.x86_64.rpm(20.03-LTS-SP2)",
									"name":"mysql-8.0.26-1.oe1.x86_64.rpm"
								},
								"name":"mysql-8.0.26-1.oe1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"mysql-8.0.26-1.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.aarch64",
					"name":"mysql-8.0.26-1.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP2",
				"product_reference":"mysql-8.0.26-1.oe1.aarch64.rpm(20.03-LTS-SP2)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.aarch64",
					"name":"mysql-8.0.26-1.oe1.aarch64 as a component of openEuler-20.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"mysql-8.0.26-1.oe1.src.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.src",
					"name":"mysql-8.0.26-1.oe1.src as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP2",
				"product_reference":"mysql-8.0.26-1.oe1.src.rpm(20.03-LTS-SP2)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.src",
					"name":"mysql-8.0.26-1.oe1.src as a component of openEuler-20.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"mysql-8.0.26-1.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.x86_64",
					"name":"mysql-8.0.26-1.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP2",
				"product_reference":"mysql-8.0.26-1.oe1.x86_64.rpm(20.03-LTS-SP2)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.x86_64",
					"name":"mysql-8.0.26-1.oe1.x86_64 as a component of openEuler-20.03-LTS-SP2"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2021-2374",
			"notes":[
				{
					"text":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.aarch64",
					"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.src",
					"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.src",
					"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.x86_64",
					"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.aarch64",
						"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.src",
						"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.src",
						"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.x86_64",
						"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.x86_64"
					],
					"details":"mysql security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1375"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.1,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.aarch64",
						"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.src",
						"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.src",
						"openEuler-20.03-LTS-SP1:mysql-8.0.26-1.oe1.x86_64",
						"openEuler-20.03-LTS-SP2:mysql-8.0.26-1.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2021-2374"
		}
	]
}