alsa-2021:3590
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)
Security Fix(es):
-
mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)
-
mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)
-
mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)
-
mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)
-
mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)
-
mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)
-
mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)
-
mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)
-
mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)
-
mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)
-
mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)
-
mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)
-
mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)
-
mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)
-
mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)
-
mysql: Server: Options unspecified vulnerability (CVE-2021-2146)
-
mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)
-
mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)
-
mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)
-
mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)
-
mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)
-
mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)
-
mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Segfault and possible DoS with a crafted query (BZ#1996699)
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-1.module_el8.4.0+2532+b8928c02.9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-1.module_el8.5.0+33+8bc5f36a.9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-16.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-16.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic-EUCJP"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-16.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic-EUCJP"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-16.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.4.0+2532+b8928c02"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.26-1.module_el8.5.0+33+8bc5f36a"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nThe following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)\n\nSecurity Fix(es):\n\n* mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)\n\n* mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)\n\n* mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)\n\n* mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)\n\n* mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)\n\n* mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)\n\n* mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)\n\n* mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)\n\n* mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)\n\n* mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)\n\n* mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)\n\n* mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)\n\n* mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)\n\n* mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)\n\n* mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)\n\n* mysql: Server: Options unspecified vulnerability (CVE-2021-2146)\n\n* mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)\n\n* mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)\n\n* mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)\n\n* mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)\n\n* mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)\n\n* mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)\n\n* mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Segfault and possible DoS with a crafted query (BZ#1996699)",
"id": "ALSA-2021:3590",
"modified": "2021-09-21T07:13:20Z",
"published": "2021-09-21T07:13:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2021-3590.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14672"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14765"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14769"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14773"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14775"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14776"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14777"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14785"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14786"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14789"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14790"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14791"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14793"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14794"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14800"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14804"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14809"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14812"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14814"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14821"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14828"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14829"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14830"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14836"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14837"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14838"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14839"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14844"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14845"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14846"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14848"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14852"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14860"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14861"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14866"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14867"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14868"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14870"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14873"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14888"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14891"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-14893"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2001"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2002"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2010"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2011"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2021"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2022"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2024"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2028"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2030"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2031"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2032"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2036"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2038"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2042"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2046"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2048"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2055"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2056"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2058"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2060"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2061"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2065"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2070"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2072"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2076"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2081"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2087"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2088"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2122"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2146"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2164"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2166"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2169"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2170"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2171"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2172"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2174"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2178"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2179"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2180"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2193"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2194"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2196"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2201"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2202"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2203"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2208"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2212"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2213"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2215"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2217"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2226"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2230"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2232"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2278"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2293"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2298"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2299"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2300"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2301"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2304"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2305"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2307"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2308"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2339"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2340"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2342"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2352"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2354"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2356"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2357"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2367"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2370"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2372"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2374"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2383"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2384"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2385"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2387"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2389"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2390"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2399"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2402"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2410"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2412"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2417"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2418"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2422"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2424"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2425"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2426"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2427"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2429"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2437"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2440"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2441"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-2444"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-35537"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-35629"
}
],
"related": [
"CVE-2020-14672",
"CVE-2021-2046",
"CVE-2021-2072",
"CVE-2021-2081",
"CVE-2021-2215",
"CVE-2021-2217",
"CVE-2021-2293",
"CVE-2021-2304",
"CVE-2021-2424",
"CVE-2020-14765",
"CVE-2020-14789",
"CVE-2020-14804",
"CVE-2020-14769",
"CVE-2020-14773",
"CVE-2020-14777",
"CVE-2020-14785",
"CVE-2020-14793",
"CVE-2020-14794",
"CVE-2020-14809",
"CVE-2020-14830",
"CVE-2020-14836",
"CVE-2020-14837",
"CVE-2020-14839",
"CVE-2020-14845",
"CVE-2020-14846",
"CVE-2020-14861",
"CVE-2020-14866",
"CVE-2020-14868",
"CVE-2020-14888",
"CVE-2020-14891",
"CVE-2020-14893",
"CVE-2021-2001",
"CVE-2021-2021",
"CVE-2021-2024",
"CVE-2021-2030",
"CVE-2021-2031",
"CVE-2021-2036",
"CVE-2021-2055",
"CVE-2021-2060",
"CVE-2021-2065",
"CVE-2021-2070",
"CVE-2021-2076",
"CVE-2021-2164",
"CVE-2021-2169",
"CVE-2021-2170",
"CVE-2021-2193",
"CVE-2021-2203",
"CVE-2021-2212",
"CVE-2021-2213",
"CVE-2021-2230",
"CVE-2021-2278",
"CVE-2021-2298",
"CVE-2021-2299",
"CVE-2021-2342",
"CVE-2021-2357",
"CVE-2021-2367",
"CVE-2021-2383",
"CVE-2021-2384",
"CVE-2021-2387",
"CVE-2021-2410",
"CVE-2021-2412",
"CVE-2021-2418",
"CVE-2021-2425",
"CVE-2021-2426",
"CVE-2021-2427",
"CVE-2021-2437",
"CVE-2021-2441",
"CVE-2021-2444",
"CVE-2020-14775",
"CVE-2020-14776",
"CVE-2020-14821",
"CVE-2020-14829",
"CVE-2020-14848",
"CVE-2021-2022",
"CVE-2021-2028",
"CVE-2021-2048",
"CVE-2021-2174",
"CVE-2021-2180",
"CVE-2021-2194",
"CVE-2021-2372",
"CVE-2021-2374",
"CVE-2021-2389",
"CVE-2021-2390",
"CVE-2021-2429",
"CVE-2020-14791",
"CVE-2021-2042",
"CVE-2020-14786",
"CVE-2020-14790",
"CVE-2020-14844",
"CVE-2021-2422",
"CVE-2020-14800",
"CVE-2020-14838",
"CVE-2020-14860",
"CVE-2020-14812",
"CVE-2021-2058",
"CVE-2021-2402",
"CVE-2020-14814",
"CVE-2020-14828",
"CVE-2021-2056",
"CVE-2021-2087",
"CVE-2021-2088",
"CVE-2021-2166",
"CVE-2021-2172",
"CVE-2021-2196",
"CVE-2021-2300",
"CVE-2021-2305",
"CVE-2021-2370",
"CVE-2021-2440",
"CVE-2020-14852",
"CVE-2020-14867",
"CVE-2021-2061",
"CVE-2021-2122",
"CVE-2021-2339",
"CVE-2021-2352",
"CVE-2021-2399",
"CVE-2020-14870",
"CVE-2020-14873",
"CVE-2021-2002",
"CVE-2021-2171",
"CVE-2021-2178",
"CVE-2021-2202",
"CVE-2021-2356",
"CVE-2021-2385",
"CVE-2021-2010",
"CVE-2021-2011",
"CVE-2021-2038",
"CVE-2021-2146",
"CVE-2021-2179",
"CVE-2021-2232",
"CVE-2021-2201",
"CVE-2021-2208",
"CVE-2021-2032",
"CVE-2021-2226",
"CVE-2021-2301",
"CVE-2021-2308",
"CVE-2021-2307",
"CVE-2021-2354",
"CVE-2021-2417",
"CVE-2021-2340"
],
"summary": "Moderate: mysql:8.0 security, bug fix, and enhancement update"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.