[ALAS2-2020-1537] Amazon Linux 2 2017.12 - ALAS2-2020-1537: important priority package update for mariadb

Severity Important
Affected Packages 27
CVEs 11

Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2021-2144:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
1951749: CVE-2021-2144 mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)

CVE-2020-2922:
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
1835850: CVE-2020-2922 mysql: C API unspecified vulnerability (CPU Apr 2020)

CVE-2020-2812:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
1830059: CVE-2020-2812 mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020)

CVE-2020-2780:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
1830056: CVE-2020-2780 mysql: Server: DML unspecified vulnerability (CPU Apr 2020)

CVE-2020-2752:
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
1835849: CVE-2020-2752 mysql: C API unspecified vulnerability (CPU Apr 2020)

CVE-2020-2574:
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
1798587: CVE-2020-2574 mysql: C API unspecified vulnerability (CPU Jan 2020)

CVE-2019-2974:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
1764691: CVE-2019-2974 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)

CVE-2019-2805:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
1732025: CVE-2019-2805 mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)

CVE-2019-2740:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
1732000: CVE-2019-2740 mysql: Server: XML unspecified vulnerability (CPU Jul 2019)

CVE-2019-2739:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
1731999: CVE-2019-2739 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)

CVE-2019-2737:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
1731997: CVE-2019-2737 mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)

Package Affected Version
pkg:rpm/amazonlinux/mariadb?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-test?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-test?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-test?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-server?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-server?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-server?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-libs?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-libs?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-libs?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-embedded?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-embedded?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-embedded?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-devel?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-devel?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-devel?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-debuginfo?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-debuginfo?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-debuginfo?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-bench?arch=x86_64&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-bench?arch=i686&distro=amazonlinux-2 < 5.5.68-1.amzn2
pkg:rpm/amazonlinux/mariadb-bench?arch=aarch64&distro=amazonlinux-2 < 5.5.68-1.amzn2
ID
ALAS2-2020-1537
Severity
important
URL
https://alas.aws.amazon.com/AL2/ALAS-2020-1537.html
Published
2020-10-22T18:28:00
(3 years ago)
Modified
2021-05-25T18:24:00
(3 years ago)
Rights
Amazon Linux Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/amazonlinux/mariadb?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb?arch=i686&distro=amazonlinux-2 amazonlinux mariadb < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb < 5.5.68-1.amzn2 amazonlinux-2 aarch64
Affected pkg:rpm/amazonlinux/mariadb-test?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb-test < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb-test?arch=i686&distro=amazonlinux-2 amazonlinux mariadb-test < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb-test?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb-test < 5.5.68-1.amzn2 amazonlinux-2 aarch64
Affected pkg:rpm/amazonlinux/mariadb-server?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb-server < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb-server?arch=i686&distro=amazonlinux-2 amazonlinux mariadb-server < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb-server?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb-server < 5.5.68-1.amzn2 amazonlinux-2 aarch64
Affected pkg:rpm/amazonlinux/mariadb-libs?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb-libs < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb-libs?arch=i686&distro=amazonlinux-2 amazonlinux mariadb-libs < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb-libs?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb-libs < 5.5.68-1.amzn2 amazonlinux-2 aarch64
Affected pkg:rpm/amazonlinux/mariadb-embedded?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb-embedded < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb-embedded?arch=i686&distro=amazonlinux-2 amazonlinux mariadb-embedded < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb-embedded?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb-embedded < 5.5.68-1.amzn2 amazonlinux-2 aarch64
Affected pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb-embedded-devel < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=i686&distro=amazonlinux-2 amazonlinux mariadb-embedded-devel < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb-embedded-devel < 5.5.68-1.amzn2 amazonlinux-2 aarch64
Affected pkg:rpm/amazonlinux/mariadb-devel?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb-devel < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb-devel?arch=i686&distro=amazonlinux-2 amazonlinux mariadb-devel < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb-devel?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb-devel < 5.5.68-1.amzn2 amazonlinux-2 aarch64
Affected pkg:rpm/amazonlinux/mariadb-debuginfo?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb-debuginfo < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb-debuginfo?arch=i686&distro=amazonlinux-2 amazonlinux mariadb-debuginfo < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb-debuginfo?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb-debuginfo < 5.5.68-1.amzn2 amazonlinux-2 aarch64
Affected pkg:rpm/amazonlinux/mariadb-bench?arch=x86_64&distro=amazonlinux-2 amazonlinux mariadb-bench < 5.5.68-1.amzn2 amazonlinux-2 x86_64
Affected pkg:rpm/amazonlinux/mariadb-bench?arch=i686&distro=amazonlinux-2 amazonlinux mariadb-bench < 5.5.68-1.amzn2 amazonlinux-2 i686
Affected pkg:rpm/amazonlinux/mariadb-bench?arch=aarch64&distro=amazonlinux-2 amazonlinux mariadb-bench < 5.5.68-1.amzn2 amazonlinux-2 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...