[RLSA-2021:3590] mysql:8.0 security, bug fix, and enhancement update
An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693)
Security Fix(es):
mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424)
mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804)
mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444)
mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042)
mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422)
mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860)
mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402)
mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440)
mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852)
mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)
mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870)
mysql: Server: Logging unspecified vulnerability (CVE-2020-14873)
mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385)
mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011)
mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038)
mysql: Server: Options unspecified vulnerability (CVE-2021-2146)
mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232)
mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208)
mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308)
mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307)
mysql: Server: Federated unspecified vulnerability (CVE-2021-2354)
mysql: Server: GIS unspecified vulnerability (CVE-2021-2417)
mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Segfault and possible DoS with a crafted query (BZ#1996699)
Package | Affected Version |
---|---|
pkg:rpm/rockylinux/mecab-ipadic?arch=x86_64&distro=rockylinux-8.3 | < 2.7.0.20070801-16.module+el8.3.0+242+87d3366a |
pkg:rpm/rockylinux/mecab-ipadic?arch=aarch64&distro=rockylinux-8.3 | < 2.7.0.20070801-16.module+el8.3.0+242+87d3366a |
pkg:rpm/rockylinux/mecab-ipadic-EUCJP?arch=x86_64&distro=rockylinux-8.3 | < 2.7.0.20070801-16.module+el8.3.0+242+87d3366a |
pkg:rpm/rockylinux/mecab-ipadic-EUCJP?arch=aarch64&distro=rockylinux-8.3 | < 2.7.0.20070801-16.module+el8.3.0+242+87d3366a |
- ID
- RLSA-2021:3590
- Severity
- moderate
- URL
- https://errata.rockylinux.org/RLSA-2021:3590
- Published
-
2021-09-21T07:13:26
(3 years ago) - Modified
-
2023-02-02T13:26:53
(19 months ago) - Rights
- Copyright 2023 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALAS-2021-1464
- ALAS-2021-1544
- ALAS-2023-1686
- ALPINE:CVE-2020-14765
- ALPINE:CVE-2020-14776
- ALPINE:CVE-2020-14789
- ALPINE:CVE-2020-14812
- ALPINE:CVE-2021-2166
- ALPINE:CVE-2021-2372
- ALPINE:CVE-2021-2389
- ALSA-2020:5500
- ALSA-2021:3590
- ALSA-2022:1556
- ALSA-2022:1557
- ASA-202105-14
- ELSA-2020-5500
- ELSA-2021-3590
- ELSA-2022-1556
- ELSA-2022-1557
- FEDORA-2020-4f9ee82bc5
- FEDORA-2020-53df1c05be
- FEDORA-2020-561eed63ef
- FEDORA-2020-ac2d47d89a
- FEDORA-2020-b995eb2973
- FEDORA-2020-eee64a579c
- FEDORA-2021-01189f6361
- FEDORA-2021-179f2fbb88
- FEDORA-2021-27187ac9dd
- FEDORA-2021-5b6c69a73a
- FEDORA-2021-68db93b130
- FEDORA-2021-72d5918529
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-b1d1655cef
- FEDORA-2021-b8b7829a83
- FEDORA-2021-db50ab62d3
- FEDORA-2021-dc4299a8d0
- FEDORA-2021-df40c41094
- FREEBSD:38A4A043-E937-11EB-9B84-D4C9EF517024
- FREEBSD:4FBA07CA-13AA-11EB-B31E-D4C9EF517024
- FREEBSD:56BA4513-A1BE-11EB-9072-D4C9EF517024
- FREEBSD:C9387E4D-2F5F-11EC-8BE6-D4C9EF517024
- GLSA-202105-27
- GLSA-202105-28
- MS:CVE-2020-14765
- MS:CVE-2020-14769
- MS:CVE-2020-14773
- MS:CVE-2020-14775
- MS:CVE-2020-14776
- MS:CVE-2020-14777
- MS:CVE-2020-14785
- MS:CVE-2020-14786
- MS:CVE-2020-14789
- MS:CVE-2020-14790
- MS:CVE-2020-14791
- MS:CVE-2020-14793
- MS:CVE-2020-14794
- MS:CVE-2020-14800
- MS:CVE-2020-14804
- MS:CVE-2020-14809
- MS:CVE-2020-14812
- MS:CVE-2020-14814
- MS:CVE-2020-14821
- MS:CVE-2020-14828
- MS:CVE-2020-14829
- MS:CVE-2020-14830
- MS:CVE-2020-14836
- MS:CVE-2020-14837
- MS:CVE-2020-14838
- MS:CVE-2020-14839
- MS:CVE-2020-14844
- MS:CVE-2020-14845
- MS:CVE-2020-14846
- MS:CVE-2020-14848
- MS:CVE-2020-14852
- MS:CVE-2020-14860
- MS:CVE-2020-14861
- MS:CVE-2020-14866
- MS:CVE-2020-14867
- MS:CVE-2020-14868
- MS:CVE-2020-14870
- MS:CVE-2020-14873
- MS:CVE-2020-14888
- MS:CVE-2020-14891
- MS:CVE-2020-14893
- MS:CVE-2021-2002
- MS:CVE-2021-2010
- MS:CVE-2021-2011
- MS:CVE-2021-2021
- MS:CVE-2021-2022
- MS:CVE-2021-2024
- MS:CVE-2021-2031
- MS:CVE-2021-2032
- MS:CVE-2021-2036
- MS:CVE-2021-2038
- MS:CVE-2021-2046
- MS:CVE-2021-2048
- MS:CVE-2021-2056
- MS:CVE-2021-2058
- MS:CVE-2021-2060
- MS:CVE-2021-2061
- MS:CVE-2021-2065
- MS:CVE-2021-2070
- MS:CVE-2021-2072
- MS:CVE-2021-2076
- MS:CVE-2021-2081
- MS:CVE-2021-2087
- MS:CVE-2021-2088
- MS:CVE-2021-2122
- MS:CVE-2021-2146
- MS:CVE-2021-2164
- MS:CVE-2021-2166
- MS:CVE-2021-2169
- MS:CVE-2021-2170
- MS:CVE-2021-2171
- MS:CVE-2021-2172
- MS:CVE-2021-2174
- MS:CVE-2021-2179
- MS:CVE-2021-2180
- MS:CVE-2021-2193
- MS:CVE-2021-2194
- MS:CVE-2021-2196
- MS:CVE-2021-2201
- MS:CVE-2021-2203
- MS:CVE-2021-2208
- MS:CVE-2021-2212
- MS:CVE-2021-2215
- MS:CVE-2021-2217
- MS:CVE-2021-2226
- MS:CVE-2021-2230
- MS:CVE-2021-2232
- MS:CVE-2021-2278
- MS:CVE-2021-2293
- MS:CVE-2021-2298
- MS:CVE-2021-2299
- MS:CVE-2021-2300
- MS:CVE-2021-2301
- MS:CVE-2021-2304
- MS:CVE-2021-2305
- MS:CVE-2021-2307
- MS:CVE-2021-2308
- MS:CVE-2021-2339
- MS:CVE-2021-2340
- MS:CVE-2021-2352
- MS:CVE-2021-2354
- MS:CVE-2021-2356
- MS:CVE-2021-2357
- MS:CVE-2021-35537
- MS:CVE-2021-35629
- openSUSE-SU-2020:2090-1
- openSUSE-SU-2020:2149-1
- openSUSE-SU-2020:2254-1
- openSUSE-SU-2021:2605-1
- openSUSE-SU-2021:2616-1
- openSUSE-SU-2021:2617-1
- openSUSE-SU-2021:2835-1
- openSUSE-SU-2021:2837-1
- openSUSE-SU-2021:2939-1
- RHSA-2019:2327
- RHSA-2020:5500
- RHSA-2021:3590
- RHSA-2022:1556
- RHSA-2022:1557
- RLSA-2020:5500
- RLSA-2022:1556
- RLSA-2022:1557
- SUSE-SU-2020:3497-1
- SUSE-SU-2020:3500-1
- SUSE-SU-2020:3564-1
- SUSE-SU-2020:3625-1
- SUSE-SU-2021:2605-1
- SUSE-SU-2021:2616-1
- SUSE-SU-2021:2617-1
- SUSE-SU-2021:2634-1
- SUSE-SU-2021:2835-1
- SUSE-SU-2021:2837-1
- SUSE-SU-2021:2939-1
- SUSE-SU-2021:3008-1
- USN-4604-1
- USN-4716-1
- USN-4952-1
- USN-5022-1
- USN-5022-2
- USN-5022-3
- VU:567764
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/mecab-ipadic?arch=x86_64&distro=rockylinux-8.3 | rockylinux | mecab-ipadic | < 2.7.0.20070801-16.module+el8.3.0+242+87d3366a | rockylinux-8.3 | x86_64 | |
Affected | pkg:rpm/rockylinux/mecab-ipadic?arch=aarch64&distro=rockylinux-8.3 | rockylinux | mecab-ipadic | < 2.7.0.20070801-16.module+el8.3.0+242+87d3366a | rockylinux-8.3 | aarch64 | |
Affected | pkg:rpm/rockylinux/mecab-ipadic-EUCJP?arch=x86_64&distro=rockylinux-8.3 | rockylinux | mecab-ipadic-EUCJP | < 2.7.0.20070801-16.module+el8.3.0+242+87d3366a | rockylinux-8.3 | x86_64 | |
Affected | pkg:rpm/rockylinux/mecab-ipadic-EUCJP?arch=aarch64&distro=rockylinux-8.3 | rockylinux | mecab-ipadic-EUCJP | < 2.7.0.20070801-16.module+el8.3.0+242+87d3366a | rockylinux-8.3 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |