alsa-2021:3590
Vulnerability from osv_almalinux
Published
2021-09-21 07:13
Modified
2021-09-21 07:13
Summary
Moderate: mysql:8.0 security, bug fix, and enhancement update
Details

MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)

Security Fix(es):

  • mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)

  • mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)

  • mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)

  • mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)

  • mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)

  • mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)

  • mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)

  • mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)

  • mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)

  • mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)

  • mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)

  • mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)

  • mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)

  • mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)

  • mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)

  • mysql: Server: Options unspecified vulnerability (CVE-2021-2146)

  • mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)

  • mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)

  • mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)

  • mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)

  • mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)

  • mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)

  • mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Segfault and possible DoS with a crafted query (BZ#1996699)

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mecab"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0.996-1.module_el8.4.0+2532+b8928c02.9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mecab"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0.996-1.module_el8.5.0+33+8bc5f36a.9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mecab-ipadic"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.7.0.20070801-16.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mecab-ipadic"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.7.0.20070801-16.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mecab-ipadic-EUCJP"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.7.0.20070801-16.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mecab-ipadic-EUCJP"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.7.0.20070801-16.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-common"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-common"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-errmsg"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-errmsg"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-server"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-server"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-test"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "mysql-test"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)\n\nSecurity Fix(es):\n\n* mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)\n\n* mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)\n\n* mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)\n\n* mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)\n\n* mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)\n\n* mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)\n\n* mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)\n\n* mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)\n\n* mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)\n\n* mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)\n\n* mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)\n\n* mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)\n\n* mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)\n\n* mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)\n\n* mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)\n\n* mysql: Server: Options unspecified vulnerability (CVE-2021-2146)\n\n* mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)\n\n* mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)\n\n* mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)\n\n* mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)\n\n* mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)\n\n* mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)\n\n* mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Segfault and possible DoS with a crafted query (BZ#1996699)",
  "id": "ALSA-2021:3590",
  "modified": "2021-09-21T07:13:20Z",
  "published": "2021-09-21T07:13:26Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/8/ALSA-2021-3590.html"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14672"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14765"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14769"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14773"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14775"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14776"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14777"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14785"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14786"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14789"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14790"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14791"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14793"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14794"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14800"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14804"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14809"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14812"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14814"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14821"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14828"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14829"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14830"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14836"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14837"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14838"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14839"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14844"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14845"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14846"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14848"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14852"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14860"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14861"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14866"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14867"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14868"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14870"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14873"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14888"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14891"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-14893"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2001"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2002"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2010"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2011"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2021"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2022"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2024"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2028"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2030"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2031"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2032"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2036"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2038"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2042"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2046"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2048"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2055"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2056"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2058"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2060"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2061"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2065"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2070"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2072"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2076"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2081"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2087"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2088"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2122"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2146"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2164"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2166"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2169"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2170"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2171"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2172"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2174"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2178"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2179"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2180"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2193"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2194"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2196"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2201"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2202"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2203"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2208"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2212"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2213"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2215"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2217"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2226"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2230"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2232"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2278"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2293"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2298"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2299"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2300"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2301"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2304"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2305"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2307"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2308"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2339"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2340"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2342"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2352"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2354"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2356"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2357"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2367"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2370"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2372"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2374"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2383"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2384"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2385"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2387"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2389"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2390"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2399"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2402"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2410"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2412"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2417"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2418"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2422"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2424"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2425"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2426"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2427"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2429"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2437"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2440"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2441"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-2444"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-35537"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-35629"
    }
  ],
  "related": [
    "CVE-2020-14672",
    "CVE-2021-2046",
    "CVE-2021-2072",
    "CVE-2021-2081",
    "CVE-2021-2215",
    "CVE-2021-2217",
    "CVE-2021-2293",
    "CVE-2021-2304",
    "CVE-2021-2424",
    "CVE-2020-14765",
    "CVE-2020-14789",
    "CVE-2020-14804",
    "CVE-2020-14769",
    "CVE-2020-14773",
    "CVE-2020-14777",
    "CVE-2020-14785",
    "CVE-2020-14793",
    "CVE-2020-14794",
    "CVE-2020-14809",
    "CVE-2020-14830",
    "CVE-2020-14836",
    "CVE-2020-14837",
    "CVE-2020-14839",
    "CVE-2020-14845",
    "CVE-2020-14846",
    "CVE-2020-14861",
    "CVE-2020-14866",
    "CVE-2020-14868",
    "CVE-2020-14888",
    "CVE-2020-14891",
    "CVE-2020-14893",
    "CVE-2021-2001",
    "CVE-2021-2021",
    "CVE-2021-2024",
    "CVE-2021-2030",
    "CVE-2021-2031",
    "CVE-2021-2036",
    "CVE-2021-2055",
    "CVE-2021-2060",
    "CVE-2021-2065",
    "CVE-2021-2070",
    "CVE-2021-2076",
    "CVE-2021-2164",
    "CVE-2021-2169",
    "CVE-2021-2170",
    "CVE-2021-2193",
    "CVE-2021-2203",
    "CVE-2021-2212",
    "CVE-2021-2213",
    "CVE-2021-2230",
    "CVE-2021-2278",
    "CVE-2021-2298",
    "CVE-2021-2299",
    "CVE-2021-2342",
    "CVE-2021-2357",
    "CVE-2021-2367",
    "CVE-2021-2383",
    "CVE-2021-2384",
    "CVE-2021-2387",
    "CVE-2021-2410",
    "CVE-2021-2412",
    "CVE-2021-2418",
    "CVE-2021-2425",
    "CVE-2021-2426",
    "CVE-2021-2427",
    "CVE-2021-2437",
    "CVE-2021-2441",
    "CVE-2021-2444",
    "CVE-2020-14775",
    "CVE-2020-14776",
    "CVE-2020-14821",
    "CVE-2020-14829",
    "CVE-2020-14848",
    "CVE-2021-2022",
    "CVE-2021-2028",
    "CVE-2021-2048",
    "CVE-2021-2174",
    "CVE-2021-2180",
    "CVE-2021-2194",
    "CVE-2021-2372",
    "CVE-2021-2374",
    "CVE-2021-2389",
    "CVE-2021-2390",
    "CVE-2021-2429",
    "CVE-2020-14791",
    "CVE-2021-2042",
    "CVE-2020-14786",
    "CVE-2020-14790",
    "CVE-2020-14844",
    "CVE-2021-2422",
    "CVE-2020-14800",
    "CVE-2020-14838",
    "CVE-2020-14860",
    "CVE-2020-14812",
    "CVE-2021-2058",
    "CVE-2021-2402",
    "CVE-2020-14814",
    "CVE-2020-14828",
    "CVE-2021-2056",
    "CVE-2021-2087",
    "CVE-2021-2088",
    "CVE-2021-2166",
    "CVE-2021-2172",
    "CVE-2021-2196",
    "CVE-2021-2300",
    "CVE-2021-2305",
    "CVE-2021-2370",
    "CVE-2021-2440",
    "CVE-2020-14852",
    "CVE-2020-14867",
    "CVE-2021-2061",
    "CVE-2021-2122",
    "CVE-2021-2339",
    "CVE-2021-2352",
    "CVE-2021-2399",
    "CVE-2020-14870",
    "CVE-2020-14873",
    "CVE-2021-2002",
    "CVE-2021-2171",
    "CVE-2021-2178",
    "CVE-2021-2202",
    "CVE-2021-2356",
    "CVE-2021-2385",
    "CVE-2021-2010",
    "CVE-2021-2011",
    "CVE-2021-2038",
    "CVE-2021-2146",
    "CVE-2021-2179",
    "CVE-2021-2232",
    "CVE-2021-2201",
    "CVE-2021-2208",
    "CVE-2021-2032",
    "CVE-2021-2226",
    "CVE-2021-2301",
    "CVE-2021-2308",
    "CVE-2021-2307",
    "CVE-2021-2354",
    "CVE-2021-2417",
    "CVE-2021-2340"
  ],
  "summary": "Moderate: mysql:8.0 security, bug fix, and enhancement update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…