Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "canonical:ubuntu_linux",
"extracted_events": [
{
"last_affected": "16.04"
},
{
"last_affected": "18.04"
},
{
"last_affected": "19.10"
},
{
"last_affected": "20.04"
}
]
},
{
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "fedoraproject:fedora",
"extracted_events": [
{
"last_affected": "30"
},
{
"last_affected": "31"
},
{
"last_affected": "32"
}
]
},
{
"cpes": [
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "netapp:active_iq_unified_manager",
"extracted_events": [
{
"introduced": "7.3"
},
{
"introduced": "9.5"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "5.6.0"
},
{
"fixed": "5.6.47"
},
{
"introduced": "5.7.0"
},
{
"fixed": "5.7.29"
},
{
"introduced": "8.0.0"
},
{
"fixed": "8.0.19"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-2901.json"
[
{
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "ref_t::mark_not_partially_updatable",
"file": "storage/innobase/lob/lob0lob.cc"
},
"source": "https://github.com/mysql/mysql-server/commit/ea7d2e2d16ac03afdd9cb72a972a95981107bf51",
"digest": {
"function_hash": "268414797295401743171423323680366405200",
"length": 623.0
},
"signature_type": "Function",
"id": "CVE-2020-2901-7ba491c1"
},
{
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "storage/innobase/lob/lob0lob.cc"
},
"source": "https://github.com/mysql/mysql-server/commit/ea7d2e2d16ac03afdd9cb72a972a95981107bf51",
"digest": {
"threshold": 0.9,
"line_hashes": [
"178328081134631892205165699778675444929",
"297069519883944742228860306989667015308",
"271109606063349901820849047573123524993"
]
},
"signature_type": "Line",
"id": "CVE-2020-2901-85335a60"
},
{
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "purge",
"file": "storage/innobase/lob/lob0purge.cc"
},
"source": "https://github.com/mysql/mysql-server/commit/ea7d2e2d16ac03afdd9cb72a972a95981107bf51",
"digest": {
"function_hash": "332510893913262879819453630442491115668",
"length": 3285.0
},
"signature_type": "Function",
"id": "CVE-2020-2901-ba81527a"
},
{
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "storage/innobase/lob/lob0purge.cc"
},
"source": "https://github.com/mysql/mysql-server/commit/ea7d2e2d16ac03afdd9cb72a972a95981107bf51",
"digest": {
"threshold": 0.9,
"line_hashes": [
"180778886619526508923404944111269113775",
"147316919537316689965784322676330417174",
"5239905161954509642413945198745085468",
"17024492428593150706336629452115852309",
"104965365280811678162014628868762321369",
"282655202815067031575135368237605253571",
"200985396871617803559027719623855045437"
]
},
"signature_type": "Line",
"id": "CVE-2020-2901-d821719f"
},
{
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "storage/innobase/include/lob0lob.h"
},
"source": "https://github.com/mysql/mysql-server/commit/ea7d2e2d16ac03afdd9cb72a972a95981107bf51",
"digest": {
"threshold": 0.9,
"line_hashes": [
"283235786766717374315559903386315292221",
"192355070266660537871885306096569471401",
"43630985206282853845868250559889278152",
"172939939025117458516457434116810536184"
]
},
"signature_type": "Line",
"id": "CVE-2020-2901-e9f11d86"
}
]
"2026-05-18T18:04:08Z"