{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2022-21519","title":"Title"},{"category":"description","text":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2022-21519","url":"https://www.suse.com/security/cve/CVE-2022-21519"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1202688 for CVE-2022-21519","url":"https://bugzilla.suse.com/1202688"}],"title":"SUSE CVE CVE-2022-21519","tracking":{"current_release_date":"2025-02-16T07:46:25Z","generator":{"date":"2023-02-15T03:29:21Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2022-21519","initial_release_date":"2023-02-15T03:29:21Z","revision_history":[{"date":"2023-02-15T03:29:21Z","number":"2","summary":"Current version"},{"date":"2025-01-01T03:18:34Z","number":"3","summary":"Current version"},{"date":"2025-02-15T03:58:21Z","number":"4","summary":"Current version"},{"date":"2025-02-16T07:46:25Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}}}