{"id":"CVE-2019-2738","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Compiling). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).","modified":"2026-04-11T12:14:11.723599Z","published":"2019-07-23T23:15:38.227Z","related":["ALSA-2019:2511","CGA-r8pr-q8q5-gq3m"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"1.0"}]},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"16.04"}]},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"18.04"}]},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"19.04"}]},{"cpe":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"29"}]},{"cpe":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"30"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.6"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.6"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.6"}]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/"},{"type":"WEB","url":"https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2484"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2511"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K51272092"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4070-1/"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"790768349bd4540a27a71c2b3b70ead085476955"},{"last_affected":"8cc757da3d87bf4a1f07dcfb2d3c96fed3806870"},{"last_affected":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"ea1efa9822d81044b726aab20c857d5e1b7e046a"},{"last_affected":"87307d4ddd88405117e3f1e51323836d57ab1f57"},{"last_affected":"dc86e412f18b36ce271f791026714e8caa0ec919"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"124c7ab1d6f914637521fd4463a993aa73403513"}],"database_specific":{"cpe":["cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"introduced":"5.6.0"},{"last_affected":"5.6.44"},{"introduced":"5.7.0"},{"last_affected":"5.7.26"},{"introduced":"0"},{"last_affected":"8.0"},{"last_affected":"8.1"},{"last_affected":"8.2"},{"last_affected":"8.4"},{"introduced":"8.0.0"},{"last_affected":"8.0.16"}]}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.6.40","mysql-5.6.44","mysql-5.7.26","mysql-8.0.0","mysql-8.0.16","mysql-8.1.0","mysql-8.2.0","mysql-8.4.0","mysql-cluster-8.0.16","mysql-cluster-8.1.0","mysql-cluster-8.2.0","mysql-cluster-8.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-2738.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}