vulnerability
Amazon Linux AMI 2: CVE-2021-2389: Security patch for mariadb (ALASMARIADB10.5-2023-003)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | Jul 21, 2021 | Sep 28, 2023 | Sep 28, 2023 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Jul 21, 2021
Added
Sep 28, 2023
Modified
Sep 28, 2023
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Solution(s)
amazon-linux-ami-2-upgrade-mariadbamazon-linux-ami-2-upgrade-mariadb-backupamazon-linux-ami-2-upgrade-mariadb-commonamazon-linux-ami-2-upgrade-mariadb-configamazon-linux-ami-2-upgrade-mariadb-connect-engineamazon-linux-ami-2-upgrade-mariadb-cracklib-password-checkamazon-linux-ami-2-upgrade-mariadb-debuginfoamazon-linux-ami-2-upgrade-mariadb-develamazon-linux-ami-2-upgrade-mariadb-embeddedamazon-linux-ami-2-upgrade-mariadb-embedded-develamazon-linux-ami-2-upgrade-mariadb-errmsgamazon-linux-ami-2-upgrade-mariadb-gssapi-serveramazon-linux-ami-2-upgrade-mariadb-libsamazon-linux-ami-2-upgrade-mariadb-oqgraph-engineamazon-linux-ami-2-upgrade-mariadb-pamamazon-linux-ami-2-upgrade-mariadb-rocksdb-engineamazon-linux-ami-2-upgrade-mariadb-s3-engineamazon-linux-ami-2-upgrade-mariadb-serveramazon-linux-ami-2-upgrade-mariadb-server-galeraamazon-linux-ami-2-upgrade-mariadb-server-utilsamazon-linux-ami-2-upgrade-mariadb-sphinx-engineamazon-linux-ami-2-upgrade-mariadb-test

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.