[ALAS2-2020-1537] Amazon Linux 2 2017.12 - ALAS2-2020-1537: important priority package update for mariadb
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2021-2144:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
1951749: CVE-2021-2144 mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)
CVE-2020-2922:
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
1835850: CVE-2020-2922 mysql: C API unspecified vulnerability (CPU Apr 2020)
CVE-2020-2812:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
1830059: CVE-2020-2812 mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020)
CVE-2020-2780:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
1830056: CVE-2020-2780 mysql: Server: DML unspecified vulnerability (CPU Apr 2020)
CVE-2020-2752:
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
1835849: CVE-2020-2752 mysql: C API unspecified vulnerability (CPU Apr 2020)
CVE-2020-2574:
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
1798587: CVE-2020-2574 mysql: C API unspecified vulnerability (CPU Jan 2020)
CVE-2019-2974:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
1764691: CVE-2019-2974 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)
CVE-2019-2805:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
1732025: CVE-2019-2805 mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)
CVE-2019-2740:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
1732000: CVE-2019-2740 mysql: Server: XML unspecified vulnerability (CPU Jul 2019)
CVE-2019-2739:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
1731999: CVE-2019-2739 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
CVE-2019-2737:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
1731997: CVE-2019-2737 mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)
- ID
- ALAS2-2020-1537
- Severity
- important
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2020-1537.html
- Published
-
2020-10-22T18:28:00
(3 years ago) - Modified
-
2021-05-25T18:24:00
(3 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS-2019-1296
- ALAS-2019-1297
- ALAS-2020-1332
- ALAS-2020-1333
- ALAS-2020-1402
- ALAS-2020-1403
- ALPINE:CVE-2019-2737
- ALPINE:CVE-2019-2739
- ALPINE:CVE-2019-2740
- ALPINE:CVE-2019-2805
- ALPINE:CVE-2019-2974
- ALPINE:CVE-2020-2574
- ALPINE:CVE-2020-2752
- ALPINE:CVE-2020-2812
- ALSA-2019:2511
- ALSA-2019:3708
- ALSA-2020:3732
- ALSA-2020:5500
- ALSA-2020:5503
- ELSA-2019-2511
- ELSA-2020-1100
- ELSA-2020-3732
- ELSA-2020-4026
- ELSA-2020-5500
- ELSA-2020-5503
- FEDORA-2019-48a0a07033
- FEDORA-2019-96516ce0ac
- FEDORA-2019-c106e46a95
- FEDORA-2019-c1fab3f139
- FEDORA-2019-d40df38271
- FEDORA-2020-136dc82437
- FEDORA-2020-20ac7c92a1
- FEDORA-2020-261c9ddd7c
- FEDORA-2020-35f52d9370
- FEDORA-2020-ac2d47d89a
- FREEBSD:198E6220-AC8B-11E9-A1C7-B499BAEBFEAF
- FREEBSD:21D59EA3-8559-11EA-A5E2-D4C9EF517024
- FREEBSD:56BA4513-A1BE-11EB-9072-D4C9EF517024
- FREEBSD:622B5C47-855B-11EA-A5E2-D4C9EF517024
- FREEBSD:A6CF65AD-37D2-11EA-A1C7-B499BAEBFEAF
- FREEBSD:CB0183BB-45F6-11EA-A1C7-B499BAEBFEAF
- FREEBSD:FC91F2EF-FD7B-11E9-A1C7-B499BAEBFEAF
- GLSA-202012-08
- GLSA-202105-27
- GLSA-202405-25
- openSUSE-SU-2019:2698-1
- openSUSE-SU-2020:0289-1
- openSUSE-SU-2020:0870-1
- RHSA-2019:2511
- RHSA-2019:3708
- RHSA-2020:1100
- RHSA-2020:3732
- RHSA-2020:4026
- RHSA-2020:5500
- RHSA-2020:5503
- RLSA-2019:2511
- RLSA-2019:3708
- RLSA-2020:3732
- RLSA-2020:5500
- RLSA-2020:5503
- SSA:2019-213-01
- SSA:2020-133-01
- SUSE-SU-2019:2461-1
- SUSE-SU-2019:2687-1
- SUSE-SU-2019:3306-1
- SUSE-SU-2019:3369-1
- SUSE-SU-2019:3370-1
- SUSE-SU-2020:0050-1
- SUSE-SU-2020:0496-1
- SUSE-SU-2020:0505-1
- SUSE-SU-2020:0523-1
- SUSE-SU-2020:0527-1
- SUSE-SU-2020:0640-1
- SUSE-SU-2020:0831-1
- SUSE-SU-2020:1625-1
- SUSE-SU-2020:1710-1
- SUSE-SU-2020:1711-1
- SUSE-SU-2020:1798-1
- SUSE-SU-2020:3625-1
- USN-4070-1
- USN-4070-2
- USN-4070-3
- USN-4195-1
- USN-4195-2
- USN-4250-1
- USN-4250-2
- USN-4350-1
- USN-4603-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2019-2737 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2737 | |
CVE | CVE-2019-2739 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2739 | |
CVE | CVE-2019-2740 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2740 | |
CVE | CVE-2019-2805 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2805 | |
CVE | CVE-2019-2974 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974 | |
CVE | CVE-2020-2574 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574 | |
CVE | CVE-2020-2752 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752 | |
CVE | CVE-2020-2780 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2780 | |
CVE | CVE-2020-2812 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812 | |
CVE | CVE-2020-2922 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2922 | |
CVE | CVE-2021-2144 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2144 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/mariadb?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mariadb-test?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb-test | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb-test?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb-test | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb-test?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb-test | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mariadb-server?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb-server | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb-server?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb-server | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb-server?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb-server | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mariadb-libs?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb-libs | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb-libs?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb-libs | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb-libs?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb-libs | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mariadb-embedded?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb-embedded | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb-embedded?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb-embedded | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb-embedded?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb-embedded | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb-embedded-devel | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb-embedded-devel | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb-embedded-devel?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb-embedded-devel | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mariadb-devel?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb-devel | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb-devel?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb-devel | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb-devel?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb-devel | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mariadb-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb-debuginfo | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb-debuginfo?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb-debuginfo | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb-debuginfo | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mariadb-bench?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mariadb-bench | < 5.5.68-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mariadb-bench?arch=i686&distro=amazonlinux-2 | amazonlinux | mariadb-bench | < 5.5.68-1.amzn2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mariadb-bench?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mariadb-bench | < 5.5.68-1.amzn2 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |