Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0127 - Security Advisory
Issued:
2012-02-13
Updated:
2012-02-13

RHSA-2012:0127 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: mysql security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated mysql packages that fix several security issues are now available
for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

MySQL is a multi-user, multi-threaded SQL database server. It consists of
the MySQL server daemon (mysqld) and many client programs and libraries.

This update fixes several vulnerabilities in the MySQL database server.
Information about these flaws can be found on the Oracle Critical Patch
Update Advisory page, listed in the References section. (CVE-2012-0075,
CVE-2012-0087, CVE-2012-0101, CVE-2012-0102, CVE-2012-0114, CVE-2012-0484,
CVE-2012-0490)

These updated packages upgrade MySQL to version 5.0.95. Refer to the MySQL
release notes for a full list of changes:

http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html

All MySQL users should upgrade to these updated packages, which correct
these issues. After installing this update, the MySQL server daemon
(mysqld) will be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 783794 - CVE-2012-0075 mysql: Unspecified vulnerability allows remote authenticated users to affect integrity
  • BZ - 783795 - CVE-2012-0087 mysql: Unspecified vulnerability allows remote authenticated users to affect availability
  • BZ - 783797 - CVE-2012-0101 mysql: Unspecified vulnerability allows remote authenticated users to affect availability
  • BZ - 783798 - CVE-2012-0102 mysql: Unspecified vulnerability allows remote authenticated users to affect availability
  • BZ - 783801 - CVE-2012-0114 mysql: Unspecified vulnerability allows local users to affect confidentiality and integrity
  • BZ - 783808 - CVE-2012-0484 mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality
  • BZ - 783815 - CVE-2012-0490 mysql: Unspecified vulnerability allows remote authenticated users to affect availability

CVEs

  • CVE-2012-0490
  • CVE-2012-0087
  • CVE-2012-0114
  • CVE-2012-0484
  • CVE-2012-0102
  • CVE-2012-0101
  • CVE-2012-0075
  • CVE-2010-1849

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html
  • http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
mysql-5.0.95-1.el5_7.1.src.rpm SHA-256: f267e6f6c2b64595b7afac46f293b88ace94fe1419356f0599d7b4fdfc32b951
x86_64
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13
mysql-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 25e66f655a8456d70a6069a974f7f06275812139c5c5e57b9acbc1e9fa16a13b
mysql-bench-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: c9cd560c1ff5ef18905d4bf9f950b60a72c1367a4e70e28bca451657bd4e68ff
mysql-devel-5.0.95-1.el5_7.1.i386.rpm SHA-256: 52586c3312900dd3bd9c4c64627c5d0088a2ed26efcf2cb342deb32160a19dda
mysql-devel-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 17956fdd59b355b8736cbba6c095b4031d82666a57439a82307c375145eb7676
mysql-server-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 439dffe34045fe5b38b3d000dd1283df16da36729fbfe9f0d1b3c2364ab1c9e8
mysql-test-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: e858c2da163acaf4ed5cf24be9dbf3180ac3d42140d22921fa715c64ebdb7e12
ia64
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13
mysql-5.0.95-1.el5_7.1.ia64.rpm SHA-256: f7b5368e55cf1925ea3396286bd8261a86870b3858a72b7b9e699adc08282fac
mysql-bench-5.0.95-1.el5_7.1.ia64.rpm SHA-256: cff6b346e4d28fe5baa463c3329ef49a4456b0c82d583ed1c31dd4cdf0070bed
mysql-devel-5.0.95-1.el5_7.1.ia64.rpm SHA-256: 06f429bf641a08692558da250fd341aa38751fbb77d55188dad0d8bf6258da6c
mysql-server-5.0.95-1.el5_7.1.ia64.rpm SHA-256: 0ca035c1ef1eacfcabc293eb1459407fb1ca8a9a33257866f12353478d70e792
mysql-test-5.0.95-1.el5_7.1.ia64.rpm SHA-256: 8f6ba09a3f89c80902bbd0b9b264193cb3131d7161ffd9fc312bea446d67a088
i386
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13
mysql-bench-5.0.95-1.el5_7.1.i386.rpm SHA-256: 5fce656558012ac2d0a76d7230570396459f77c360c0a1e4e2494f86f3c369ad
mysql-devel-5.0.95-1.el5_7.1.i386.rpm SHA-256: 52586c3312900dd3bd9c4c64627c5d0088a2ed26efcf2cb342deb32160a19dda
mysql-server-5.0.95-1.el5_7.1.i386.rpm SHA-256: 0b305b192cf20368335b190720c35794b1ecac7f9b189a3d5ba7874bf8f533f6
mysql-test-5.0.95-1.el5_7.1.i386.rpm SHA-256: 641b918a987f3167f2e3a8ffe994e87d78f85e30900d2347dcdc8f7a9d7629da

Red Hat Enterprise Linux Workstation 5

SRPM
mysql-5.0.95-1.el5_7.1.src.rpm SHA-256: f267e6f6c2b64595b7afac46f293b88ace94fe1419356f0599d7b4fdfc32b951
x86_64
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13
mysql-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 25e66f655a8456d70a6069a974f7f06275812139c5c5e57b9acbc1e9fa16a13b
mysql-bench-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: c9cd560c1ff5ef18905d4bf9f950b60a72c1367a4e70e28bca451657bd4e68ff
mysql-devel-5.0.95-1.el5_7.1.i386.rpm SHA-256: 52586c3312900dd3bd9c4c64627c5d0088a2ed26efcf2cb342deb32160a19dda
mysql-devel-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 17956fdd59b355b8736cbba6c095b4031d82666a57439a82307c375145eb7676
mysql-server-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 439dffe34045fe5b38b3d000dd1283df16da36729fbfe9f0d1b3c2364ab1c9e8
mysql-test-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: e858c2da163acaf4ed5cf24be9dbf3180ac3d42140d22921fa715c64ebdb7e12
i386
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13
mysql-bench-5.0.95-1.el5_7.1.i386.rpm SHA-256: 5fce656558012ac2d0a76d7230570396459f77c360c0a1e4e2494f86f3c369ad
mysql-devel-5.0.95-1.el5_7.1.i386.rpm SHA-256: 52586c3312900dd3bd9c4c64627c5d0088a2ed26efcf2cb342deb32160a19dda
mysql-server-5.0.95-1.el5_7.1.i386.rpm SHA-256: 0b305b192cf20368335b190720c35794b1ecac7f9b189a3d5ba7874bf8f533f6
mysql-test-5.0.95-1.el5_7.1.i386.rpm SHA-256: 641b918a987f3167f2e3a8ffe994e87d78f85e30900d2347dcdc8f7a9d7629da

Red Hat Enterprise Linux Desktop 5

SRPM
mysql-5.0.95-1.el5_7.1.src.rpm SHA-256: f267e6f6c2b64595b7afac46f293b88ace94fe1419356f0599d7b4fdfc32b951
x86_64
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13
mysql-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 25e66f655a8456d70a6069a974f7f06275812139c5c5e57b9acbc1e9fa16a13b
i386
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
mysql-5.0.95-1.el5_7.1.src.rpm SHA-256: f267e6f6c2b64595b7afac46f293b88ace94fe1419356f0599d7b4fdfc32b951
s390x
mysql-5.0.95-1.el5_7.1.s390.rpm SHA-256: b6541efebd66d1334096cb3cd19fa489971ad44733b65c58007f8ce62895ae98
mysql-5.0.95-1.el5_7.1.s390x.rpm SHA-256: 36ffeb19a17b08a962c84e490c20c5ae42fcb56edf922fb62ddd5a2898c0a672
mysql-bench-5.0.95-1.el5_7.1.s390x.rpm SHA-256: 708d95a0c2d58c148ae45db4323add5f9e4347bf73d88d150f69d727f94b0d09
mysql-devel-5.0.95-1.el5_7.1.s390.rpm SHA-256: 830ee28fba288c92a478ed5ba8470ba207892f35f2a6c7868580d737bef175bb
mysql-devel-5.0.95-1.el5_7.1.s390x.rpm SHA-256: 1c719ff7ee730ccd96c5d6c119ff2bae9f4c71107cd7f37e979374706445e829
mysql-server-5.0.95-1.el5_7.1.s390x.rpm SHA-256: e961881d9a846c3a1864ebef21ee2df16ffaa4bf92e8b800e99ae90fa2a504e6
mysql-test-5.0.95-1.el5_7.1.s390x.rpm SHA-256: 0b2823f9e551f947d160b5dde4fb11d802577fffe4205ff2950cda89360cc98f

Red Hat Enterprise Linux for Power, big endian 5

SRPM
mysql-5.0.95-1.el5_7.1.src.rpm SHA-256: f267e6f6c2b64595b7afac46f293b88ace94fe1419356f0599d7b4fdfc32b951
ppc
mysql-5.0.95-1.el5_7.1.ppc.rpm SHA-256: 29921fd683e486bd42390db6cc5e2f5e2c47ec77d2ba569532fcc58a92d1a689
mysql-5.0.95-1.el5_7.1.ppc64.rpm SHA-256: d13c39445accf3b7630f68b0239ca6e439175de8a60177b6ee91cbcf3f6a9007
mysql-bench-5.0.95-1.el5_7.1.ppc.rpm SHA-256: 650b9d0180ae9be8ff470fc5c3a3ca7091471a3c44bae0ea33faa9b4ae1043e1
mysql-devel-5.0.95-1.el5_7.1.ppc.rpm SHA-256: 2e612522b0d2998fcce97618f4b46e5547ec0acbc1603e775dae96654551e912
mysql-devel-5.0.95-1.el5_7.1.ppc64.rpm SHA-256: 216458207f46788d20f7ab787086d0010799a9a32753a946618f2cea6a388e06
mysql-server-5.0.95-1.el5_7.1.ppc.rpm SHA-256: 784cee7a97c677210197a7a7d061a4aa7aa10ca528aacdc37e59440e21d9834a
mysql-server-5.0.95-1.el5_7.1.ppc64.rpm SHA-256: 4efbe410f32af468cf7b276a0b5f59db627e02edfdca280aca11082fffbb2d31
mysql-test-5.0.95-1.el5_7.1.ppc.rpm SHA-256: 30438d5e704d93cbde7c7119188ffe6db63ec98de34cce3ac7f03e74f96f024a

Red Hat Enterprise Linux Server from RHUI 5

SRPM
mysql-5.0.95-1.el5_7.1.src.rpm SHA-256: f267e6f6c2b64595b7afac46f293b88ace94fe1419356f0599d7b4fdfc32b951
x86_64
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13
mysql-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 25e66f655a8456d70a6069a974f7f06275812139c5c5e57b9acbc1e9fa16a13b
mysql-bench-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: c9cd560c1ff5ef18905d4bf9f950b60a72c1367a4e70e28bca451657bd4e68ff
mysql-devel-5.0.95-1.el5_7.1.i386.rpm SHA-256: 52586c3312900dd3bd9c4c64627c5d0088a2ed26efcf2cb342deb32160a19dda
mysql-devel-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 17956fdd59b355b8736cbba6c095b4031d82666a57439a82307c375145eb7676
mysql-server-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: 439dffe34045fe5b38b3d000dd1283df16da36729fbfe9f0d1b3c2364ab1c9e8
mysql-test-5.0.95-1.el5_7.1.x86_64.rpm SHA-256: e858c2da163acaf4ed5cf24be9dbf3180ac3d42140d22921fa715c64ebdb7e12
i386
mysql-5.0.95-1.el5_7.1.i386.rpm SHA-256: e593e8bd8ca33c7c928693f2f80e21694668d9328a22e0c6c3eaf0507a6e9c13
mysql-bench-5.0.95-1.el5_7.1.i386.rpm SHA-256: 5fce656558012ac2d0a76d7230570396459f77c360c0a1e4e2494f86f3c369ad
mysql-devel-5.0.95-1.el5_7.1.i386.rpm SHA-256: 52586c3312900dd3bd9c4c64627c5d0088a2ed26efcf2cb342deb32160a19dda
mysql-server-5.0.95-1.el5_7.1.i386.rpm SHA-256: 0b305b192cf20368335b190720c35794b1ecac7f9b189a3d5ba7874bf8f533f6
mysql-test-5.0.95-1.el5_7.1.i386.rpm SHA-256: 641b918a987f3167f2e3a8ffe994e87d78f85e30900d2347dcdc8f7a9d7629da

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility