First published: Mon Jul 22 2019(Updated: )
Last updated 24 July 2024
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <5.6.45 | 5.6.45 |
redhat/mysql | <5.7.27 | 5.7.27 |
redhat/mysql | <8.0.17 | 8.0.17 |
redhat/mariadb | <5.5.65 | 5.5.65 |
redhat/mariadb | <10.4.7 | 10.4.7 |
redhat/mariadb | <10.3.17 | 10.3.17 |
redhat/mariadb | <10.2.26 | 10.2.26 |
redhat/mariadb | <10.1.41 | 10.1.41 |
debian/mariadb-10.1 | ||
debian/mysql-5.7 | ||
Oracle MySQL | >=5.6.0<=5.6.44 | |
Oracle MySQL | >=5.7.0<=5.7.26 | |
Oracle MySQL | >=8.0.0<=8.0.16 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
MariaDB | >=5.5.0<5.5.65 | |
MariaDB | >=10.1.0<10.1.41 | |
MariaDB | >=10.2.0<10.2.26 | |
MariaDB | >=10.3.0<10.3.17 | |
MariaDB | >=10.4.0<10.4.7 | |
Red Hat Enterprise Linux Desktop | =8.0 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server EUS | =8.6 | |
Red Hat Enterprise Linux Server | =8.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Workstation | =8.0 | |
Fedora | =29 | |
Fedora | =30 | |
SUSE Linux | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2740 is rated as a critical vulnerability due to its potential impact on affected MySQL Server versions.
To remediate CVE-2019-2740, upgrade your MySQL Server to version 5.6.45, 5.7.27, or 8.0.17 or later.
CVE-2019-2740 affects MySQL versions 5.6.44 and earlier, 5.7.26 and earlier, and 8.0.16 and earlier.
Yes, certain versions of MariaDB are affected by CVE-2019-2740, including versions prior to 5.5.65 and between 10.1.41 and 10.4.7.
CVE-2019-2740 could allow an attacker with low privileges to execute unauthorized code remotely, leading to data breaches or system compromise.