First published: Wed Jan 20 2021(Updated: )
An unspecified vulnerability in Oracle MySQL Server related to the Server: Locking component could allow an authenticated attacker to cause a denial of service resulting in a high availability impact using unknown attack vectors.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <8.0.23 | 8.0.23 |
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
MySQL | >=8.0.0<=8.0.22 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
NetApp SnapCenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-2058 has a severity rating that indicates a potential high availability impact due to a denial of service vulnerability.
To fix CVE-2021-2058, you should update your Oracle MySQL Server to version 8.0.23 or later.
CVE-2021-2058 affects various versions of Oracle MySQL Server, as well as IBM InfoSphere Guardium from versions 10.5 up to 11.3.
CVE-2021-2058 requires authentication for exploitation, but may allow an attacker to cause a denial of service on the affected system.
Currently, the recommended solution for CVE-2021-2058 is to apply the latest software updates, as no specific workaround has been recommended.