7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.9 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
0.006 Low
EPSS
Percentile
78.3%
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.21).
Security Fix(es):
mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702)
mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957)
mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634)
mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925)
mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567)
mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725)
mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011)
mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580)
mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619)
mysql: Server: Connection unspecified vulnerability (CVE-2019-3009)
mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632)
mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620)
mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574)
mysql: Server: Logging unspecified vulnerability (CVE-2020-2770)
mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804)
mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812)
mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694)
mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898)
mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903)
mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921)
mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926)
mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553)
mysql: Server: UDF unspecified vulnerability (CVE-2020-14576)
mysql: Server: JSON unspecified vulnerability (CVE-2020-14624)
mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631)
mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651)
mysql: Server: Locking unspecified vulnerability (CVE-2020-14656)
mysql: Information Schema unspecified vulnerability (CVE-2019-2911)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
bugzilla.redhat.com/show_bug.cgi?id=1764675
bugzilla.redhat.com/show_bug.cgi?id=1764676
bugzilla.redhat.com/show_bug.cgi?id=1764680
bugzilla.redhat.com/show_bug.cgi?id=1764681
bugzilla.redhat.com/show_bug.cgi?id=1764684
bugzilla.redhat.com/show_bug.cgi?id=1764685
bugzilla.redhat.com/show_bug.cgi?id=1764686
bugzilla.redhat.com/show_bug.cgi?id=1764687
bugzilla.redhat.com/show_bug.cgi?id=1764688
bugzilla.redhat.com/show_bug.cgi?id=1764689
bugzilla.redhat.com/show_bug.cgi?id=1764691
bugzilla.redhat.com/show_bug.cgi?id=1764692
bugzilla.redhat.com/show_bug.cgi?id=1764693
bugzilla.redhat.com/show_bug.cgi?id=1764694
bugzilla.redhat.com/show_bug.cgi?id=1764695
bugzilla.redhat.com/show_bug.cgi?id=1764696
bugzilla.redhat.com/show_bug.cgi?id=1764698
bugzilla.redhat.com/show_bug.cgi?id=1764699
bugzilla.redhat.com/show_bug.cgi?id=1764700
bugzilla.redhat.com/show_bug.cgi?id=1764701
bugzilla.redhat.com/show_bug.cgi?id=1796880
bugzilla.redhat.com/show_bug.cgi?id=1796881
bugzilla.redhat.com/show_bug.cgi?id=1796882
bugzilla.redhat.com/show_bug.cgi?id=1796883
bugzilla.redhat.com/show_bug.cgi?id=1796884
bugzilla.redhat.com/show_bug.cgi?id=1796885
bugzilla.redhat.com/show_bug.cgi?id=1796886
bugzilla.redhat.com/show_bug.cgi?id=1796887
bugzilla.redhat.com/show_bug.cgi?id=1796888
bugzilla.redhat.com/show_bug.cgi?id=1796889
bugzilla.redhat.com/show_bug.cgi?id=1796905
bugzilla.redhat.com/show_bug.cgi?id=1798559
bugzilla.redhat.com/show_bug.cgi?id=1798576
bugzilla.redhat.com/show_bug.cgi?id=1798587
bugzilla.redhat.com/show_bug.cgi?id=1830048
bugzilla.redhat.com/show_bug.cgi?id=1830049
bugzilla.redhat.com/show_bug.cgi?id=1830050
bugzilla.redhat.com/show_bug.cgi?id=1830051
bugzilla.redhat.com/show_bug.cgi?id=1830052
bugzilla.redhat.com/show_bug.cgi?id=1830053
bugzilla.redhat.com/show_bug.cgi?id=1830054
bugzilla.redhat.com/show_bug.cgi?id=1830055
bugzilla.redhat.com/show_bug.cgi?id=1830056
bugzilla.redhat.com/show_bug.cgi?id=1830058
bugzilla.redhat.com/show_bug.cgi?id=1830059
bugzilla.redhat.com/show_bug.cgi?id=1830060
bugzilla.redhat.com/show_bug.cgi?id=1830061
bugzilla.redhat.com/show_bug.cgi?id=1830062
bugzilla.redhat.com/show_bug.cgi?id=1830064
bugzilla.redhat.com/show_bug.cgi?id=1830066
bugzilla.redhat.com/show_bug.cgi?id=1830067
bugzilla.redhat.com/show_bug.cgi?id=1830068
bugzilla.redhat.com/show_bug.cgi?id=1830069
bugzilla.redhat.com/show_bug.cgi?id=1830070
bugzilla.redhat.com/show_bug.cgi?id=1830071
bugzilla.redhat.com/show_bug.cgi?id=1830072
bugzilla.redhat.com/show_bug.cgi?id=1830073
bugzilla.redhat.com/show_bug.cgi?id=1830074
bugzilla.redhat.com/show_bug.cgi?id=1830075
bugzilla.redhat.com/show_bug.cgi?id=1830076
bugzilla.redhat.com/show_bug.cgi?id=1830077
bugzilla.redhat.com/show_bug.cgi?id=1830078
bugzilla.redhat.com/show_bug.cgi?id=1830079
bugzilla.redhat.com/show_bug.cgi?id=1830082
bugzilla.redhat.com/show_bug.cgi?id=1835849
bugzilla.redhat.com/show_bug.cgi?id=1835850
bugzilla.redhat.com/show_bug.cgi?id=1865945
bugzilla.redhat.com/show_bug.cgi?id=1865947
bugzilla.redhat.com/show_bug.cgi?id=1865948
bugzilla.redhat.com/show_bug.cgi?id=1865949
bugzilla.redhat.com/show_bug.cgi?id=1865950
bugzilla.redhat.com/show_bug.cgi?id=1865951
bugzilla.redhat.com/show_bug.cgi?id=1865952
bugzilla.redhat.com/show_bug.cgi?id=1865953
bugzilla.redhat.com/show_bug.cgi?id=1865954
bugzilla.redhat.com/show_bug.cgi?id=1865955
bugzilla.redhat.com/show_bug.cgi?id=1865956
bugzilla.redhat.com/show_bug.cgi?id=1865958
bugzilla.redhat.com/show_bug.cgi?id=1865959
bugzilla.redhat.com/show_bug.cgi?id=1865960
bugzilla.redhat.com/show_bug.cgi?id=1865961
bugzilla.redhat.com/show_bug.cgi?id=1865962
bugzilla.redhat.com/show_bug.cgi?id=1865963
bugzilla.redhat.com/show_bug.cgi?id=1865964
bugzilla.redhat.com/show_bug.cgi?id=1865965
bugzilla.redhat.com/show_bug.cgi?id=1865966
bugzilla.redhat.com/show_bug.cgi?id=1865967
bugzilla.redhat.com/show_bug.cgi?id=1865968
bugzilla.redhat.com/show_bug.cgi?id=1865969
bugzilla.redhat.com/show_bug.cgi?id=1865970
bugzilla.redhat.com/show_bug.cgi?id=1865971
bugzilla.redhat.com/show_bug.cgi?id=1865972
bugzilla.redhat.com/show_bug.cgi?id=1865973
bugzilla.redhat.com/show_bug.cgi?id=1865974
bugzilla.redhat.com/show_bug.cgi?id=1865975
bugzilla.redhat.com/show_bug.cgi?id=1865976
bugzilla.redhat.com/show_bug.cgi?id=1865977
bugzilla.redhat.com/show_bug.cgi?id=1865982
bugzilla.redhat.com/show_bug.cgi?id=1874040
errata.rockylinux.org/RLSA-2020:3732
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.9 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
0.006 Low
EPSS
Percentile
78.3%