7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:P/I:P/A:C
0.269 Low
EPSS
Percentile
96.7%
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)
Security Fix(es):
mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)
mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)
mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)
mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)
mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)
mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)
mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)
mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)
mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)
mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)
mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)
mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)
mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)
mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)
mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)
mysql: Server: Options unspecified vulnerability (CVE-2021-2146)
mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)
mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)
mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)
mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)
mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)
mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)
mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
bugzilla.redhat.com/show_bug.cgi?id=1890737
bugzilla.redhat.com/show_bug.cgi?id=1890738
bugzilla.redhat.com/show_bug.cgi?id=1890739
bugzilla.redhat.com/show_bug.cgi?id=1890742
bugzilla.redhat.com/show_bug.cgi?id=1890743
bugzilla.redhat.com/show_bug.cgi?id=1890744
bugzilla.redhat.com/show_bug.cgi?id=1890745
bugzilla.redhat.com/show_bug.cgi?id=1890746
bugzilla.redhat.com/show_bug.cgi?id=1890747
bugzilla.redhat.com/show_bug.cgi?id=1890748
bugzilla.redhat.com/show_bug.cgi?id=1890749
bugzilla.redhat.com/show_bug.cgi?id=1890750
bugzilla.redhat.com/show_bug.cgi?id=1890751
bugzilla.redhat.com/show_bug.cgi?id=1890753
bugzilla.redhat.com/show_bug.cgi?id=1890754
bugzilla.redhat.com/show_bug.cgi?id=1890755
bugzilla.redhat.com/show_bug.cgi?id=1890756
bugzilla.redhat.com/show_bug.cgi?id=1890757
bugzilla.redhat.com/show_bug.cgi?id=1890758
bugzilla.redhat.com/show_bug.cgi?id=1890760
bugzilla.redhat.com/show_bug.cgi?id=1890761
bugzilla.redhat.com/show_bug.cgi?id=1890762
bugzilla.redhat.com/show_bug.cgi?id=1890763
bugzilla.redhat.com/show_bug.cgi?id=1890764
bugzilla.redhat.com/show_bug.cgi?id=1890765
bugzilla.redhat.com/show_bug.cgi?id=1890766
bugzilla.redhat.com/show_bug.cgi?id=1890767
bugzilla.redhat.com/show_bug.cgi?id=1890768
bugzilla.redhat.com/show_bug.cgi?id=1890769
bugzilla.redhat.com/show_bug.cgi?id=1890770
bugzilla.redhat.com/show_bug.cgi?id=1890771
bugzilla.redhat.com/show_bug.cgi?id=1890772
bugzilla.redhat.com/show_bug.cgi?id=1890773
bugzilla.redhat.com/show_bug.cgi?id=1890774
bugzilla.redhat.com/show_bug.cgi?id=1890775
bugzilla.redhat.com/show_bug.cgi?id=1890776
bugzilla.redhat.com/show_bug.cgi?id=1890778
bugzilla.redhat.com/show_bug.cgi?id=1890779
bugzilla.redhat.com/show_bug.cgi?id=1890781
bugzilla.redhat.com/show_bug.cgi?id=1890782
bugzilla.redhat.com/show_bug.cgi?id=1890783
bugzilla.redhat.com/show_bug.cgi?id=1890784
bugzilla.redhat.com/show_bug.cgi?id=1922379
bugzilla.redhat.com/show_bug.cgi?id=1922380
bugzilla.redhat.com/show_bug.cgi?id=1922383
bugzilla.redhat.com/show_bug.cgi?id=1922384
bugzilla.redhat.com/show_bug.cgi?id=1922388
bugzilla.redhat.com/show_bug.cgi?id=1922389
bugzilla.redhat.com/show_bug.cgi?id=1922390
bugzilla.redhat.com/show_bug.cgi?id=1922391
bugzilla.redhat.com/show_bug.cgi?id=1922392
bugzilla.redhat.com/show_bug.cgi?id=1922393
bugzilla.redhat.com/show_bug.cgi?id=1922394
bugzilla.redhat.com/show_bug.cgi?id=1922395
bugzilla.redhat.com/show_bug.cgi?id=1922396
bugzilla.redhat.com/show_bug.cgi?id=1922397
bugzilla.redhat.com/show_bug.cgi?id=1922398
bugzilla.redhat.com/show_bug.cgi?id=1922399
bugzilla.redhat.com/show_bug.cgi?id=1922400
bugzilla.redhat.com/show_bug.cgi?id=1922401
bugzilla.redhat.com/show_bug.cgi?id=1922402
bugzilla.redhat.com/show_bug.cgi?id=1922403
bugzilla.redhat.com/show_bug.cgi?id=1922404
bugzilla.redhat.com/show_bug.cgi?id=1922405
bugzilla.redhat.com/show_bug.cgi?id=1922406
bugzilla.redhat.com/show_bug.cgi?id=1922407
bugzilla.redhat.com/show_bug.cgi?id=1922408
bugzilla.redhat.com/show_bug.cgi?id=1922410
bugzilla.redhat.com/show_bug.cgi?id=1922411
bugzilla.redhat.com/show_bug.cgi?id=1922416
bugzilla.redhat.com/show_bug.cgi?id=1922419
bugzilla.redhat.com/show_bug.cgi?id=1951751
bugzilla.redhat.com/show_bug.cgi?id=1951754
bugzilla.redhat.com/show_bug.cgi?id=1951755
bugzilla.redhat.com/show_bug.cgi?id=1951756
bugzilla.redhat.com/show_bug.cgi?id=1951757
bugzilla.redhat.com/show_bug.cgi?id=1951758
bugzilla.redhat.com/show_bug.cgi?id=1951759
bugzilla.redhat.com/show_bug.cgi?id=1951760
bugzilla.redhat.com/show_bug.cgi?id=1951761
bugzilla.redhat.com/show_bug.cgi?id=1951762
bugzilla.redhat.com/show_bug.cgi?id=1951763
bugzilla.redhat.com/show_bug.cgi?id=1951764
bugzilla.redhat.com/show_bug.cgi?id=1951765
bugzilla.redhat.com/show_bug.cgi?id=1951766
bugzilla.redhat.com/show_bug.cgi?id=1951767
bugzilla.redhat.com/show_bug.cgi?id=1951768
bugzilla.redhat.com/show_bug.cgi?id=1951769
bugzilla.redhat.com/show_bug.cgi?id=1951770
bugzilla.redhat.com/show_bug.cgi?id=1951771
bugzilla.redhat.com/show_bug.cgi?id=1951772
bugzilla.redhat.com/show_bug.cgi?id=1951773
bugzilla.redhat.com/show_bug.cgi?id=1951774
bugzilla.redhat.com/show_bug.cgi?id=1951775
bugzilla.redhat.com/show_bug.cgi?id=1951776
bugzilla.redhat.com/show_bug.cgi?id=1951777
bugzilla.redhat.com/show_bug.cgi?id=1951778
bugzilla.redhat.com/show_bug.cgi?id=1951779
bugzilla.redhat.com/show_bug.cgi?id=1951780
bugzilla.redhat.com/show_bug.cgi?id=1951781
bugzilla.redhat.com/show_bug.cgi?id=1951782
bugzilla.redhat.com/show_bug.cgi?id=1951783
bugzilla.redhat.com/show_bug.cgi?id=1951784
bugzilla.redhat.com/show_bug.cgi?id=1951785
bugzilla.redhat.com/show_bug.cgi?id=1951786
bugzilla.redhat.com/show_bug.cgi?id=1952802
bugzilla.redhat.com/show_bug.cgi?id=1992279
bugzilla.redhat.com/show_bug.cgi?id=1992280
bugzilla.redhat.com/show_bug.cgi?id=1992294
bugzilla.redhat.com/show_bug.cgi?id=1992297
bugzilla.redhat.com/show_bug.cgi?id=1992298
bugzilla.redhat.com/show_bug.cgi?id=1992299
bugzilla.redhat.com/show_bug.cgi?id=1992300
bugzilla.redhat.com/show_bug.cgi?id=1992301
bugzilla.redhat.com/show_bug.cgi?id=1992302
bugzilla.redhat.com/show_bug.cgi?id=1992303
bugzilla.redhat.com/show_bug.cgi?id=1992304
bugzilla.redhat.com/show_bug.cgi?id=1992305
bugzilla.redhat.com/show_bug.cgi?id=1992306
bugzilla.redhat.com/show_bug.cgi?id=1992307
bugzilla.redhat.com/show_bug.cgi?id=1992308
bugzilla.redhat.com/show_bug.cgi?id=1992309
bugzilla.redhat.com/show_bug.cgi?id=1992310
bugzilla.redhat.com/show_bug.cgi?id=1992311
bugzilla.redhat.com/show_bug.cgi?id=1992312
bugzilla.redhat.com/show_bug.cgi?id=1992313
bugzilla.redhat.com/show_bug.cgi?id=1992314
bugzilla.redhat.com/show_bug.cgi?id=1992315
bugzilla.redhat.com/show_bug.cgi?id=1992316
bugzilla.redhat.com/show_bug.cgi?id=1992317
bugzilla.redhat.com/show_bug.cgi?id=1992318
bugzilla.redhat.com/show_bug.cgi?id=1992319
bugzilla.redhat.com/show_bug.cgi?id=1992320
bugzilla.redhat.com/show_bug.cgi?id=1992321
bugzilla.redhat.com/show_bug.cgi?id=1992322
bugzilla.redhat.com/show_bug.cgi?id=1992323
bugzilla.redhat.com/show_bug.cgi?id=1992324
bugzilla.redhat.com/show_bug.cgi?id=1992325
bugzilla.redhat.com/show_bug.cgi?id=1992326
bugzilla.redhat.com/show_bug.cgi?id=1996693
bugzilla.redhat.com/show_bug.cgi?id=1996699
errata.rockylinux.org/RLSA-2021:3590
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:P/I:P/A:C
0.269 Low
EPSS
Percentile
96.7%