Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. External References: https://www.oracle.com/security-alerts/cpujan2021.html#AppendixMSQL
Created mysql:5.7/community-mysql tracking bugs for this issue: Affects: fedora-32 [bug 1922456]
Created mysql:8.0/community-mysql tracking bugs for this issue: Affects: fedora-all [bug 1922447]
MariaDB upstream indicates that they corrected this issue in MariaDB versions 5.5.61, 10.0.35, 10.1.33, and 10.2.15, as well as MariaDB Connector/C version 3.0.5. Therefore: * The mariadb:10.3 module in Red Hat Enterprise Linux 8 was never affected by this issue. * The mariadb-connector-c packages in Red Hat Enterprise Linux 8 were never affected, as the first version included in the product was 3.0.7. * The mariadb packages in Red Hat Enterprise Linux 7 were updated to the fixed upstream version via this erratum: https://access.redhat.com/errata/RHSA-2019:2327 * The rh-mariadb103-mariadb packages in Red Hat Software Collections were never affected by this issue.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-2011
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:3590 https://access.redhat.com/errata/RHSA-2021:3590
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2021:3811 https://access.redhat.com/errata/RHSA-2021:3811