First published: Wed Jan 20 2021(Updated: )
An unspecified vulnerability in Oracle MySQL related to the Server: DDL component could allow an authenticated attacker to cause a denial of service resulting in a high availability impact using unknown attack vectors.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <8.0.23 | 8.0.23 |
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
MySQL | >=8.0.0<=8.0.22 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp snapcenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-2122 is considered to have a high severity due to the potential for denial of service impacts.
To remediate CVE-2021-2122, upgrade to MySQL version 8.0.23 or a later patched version.
CVE-2021-2122 affects the Oracle MySQL product specifically related to the Server: DDL component.
No, CVE-2021-2122 requires authentication to exploit, limiting the attack surface.
CVE-2021-2122 impacts various software including MySQL, IBM InfoSphere Guardium, and NetApp products.