vulnerability

Oracle Linux: CVE-2020-2752: ELSA-2020-3732: mysql:8.0 security update (IMPORTANT) (Multiple Advisories)

Severity
3
CVSS
(AV:N/AC:M/Au:S/C:N/I:N/A:P)
Published
Apr 14, 2020
Added
Sep 17, 2020
Modified
Dec 3, 2025

Description

Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).

Solutions

oracle-linux-upgrade-asio-develoracle-linux-upgrade-galeraoracle-linux-upgrade-judyoracle-linux-upgrade-judy-develoracle-linux-upgrade-mariadboracle-linux-upgrade-mariadb-backuporacle-linux-upgrade-mariadb-benchoracle-linux-upgrade-mariadb-commonoracle-linux-upgrade-mariadb-connector-coracle-linux-upgrade-mariadb-connector-c-configoracle-linux-upgrade-mariadb-connector-c-develoracle-linux-upgrade-mariadb-develoracle-linux-upgrade-mariadb-embeddedoracle-linux-upgrade-mariadb-embedded-develoracle-linux-upgrade-mariadb-errmsgoracle-linux-upgrade-mariadb-gssapi-serveroracle-linux-upgrade-mariadb-libsoracle-linux-upgrade-mariadb-oqgraph-engineoracle-linux-upgrade-mariadb-serveroracle-linux-upgrade-mariadb-server-galeraoracle-linux-upgrade-mariadb-server-utilsoracle-linux-upgrade-mariadb-testoracle-linux-upgrade-mecaboracle-linux-upgrade-mecab-ipadicoracle-linux-upgrade-mecab-ipadic-eucjporacle-linux-upgrade-mysqloracle-linux-upgrade-mysql-commonoracle-linux-upgrade-mysql-develoracle-linux-upgrade-mysql-errmsgoracle-linux-upgrade-mysql-libsoracle-linux-upgrade-mysql-serveroracle-linux-upgrade-mysql-test
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.