Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2017:2787 - Security Advisory
Issued:
2017-09-21
Updated:
2017-09-21

RHSA-2017:2787 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: rh-mysql56-mysql security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for rh-mysql56-mysql is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.

The following packages have been upgraded to a later upstream version: rh-mysql56-mysql (5.6.37).

Security Fix(es):

  • An integer overflow flaw leading to a buffer overflow was found in the way MySQL parsed connection handshake packets. An unauthenticated remote attacker with access to the MySQL port could use this flaw to crash the mysqld daemon. (CVE-2017-3599)
  • It was discovered that the mysql and mysqldump tools did not correctly handle database and table names containing newline characters. A database user with privileges to create databases or tables could cause the mysql command to execute arbitrary shell or SQL commands while restoring database backup created using the mysqldump tool. (CVE-2016-5483, CVE-2017-3600)
  • Multiple flaws were found in the way the MySQL init script handled initialization of the database data directory and permission setting on the error log file. The mysql operating system user could use these flaws to escalate their privileges to root. (CVE-2017-3265)
  • It was discovered that the mysqld_safe script honored the ledir option value set in a MySQL configuration file. A user able to modify one of the MySQL configuration files could use this flaw to escalate their privileges to root. (CVE-2017-3291)
  • It was discovered that the MySQL client command line tools only checked after authentication whether server supported SSL. A man-in-the-middle attacker could use this flaw to hijack client's authentication to the server even if the client was configured to require SSL connection. (CVE-2017-3305)
  • Multiple flaws were found in the way the mysqld_safe script handled creation of error log file. The mysql operating system user could use these flaws to escalate their privileges to root. (CVE-2017-3312)
  • A flaw was found in the way MySQL client library (libmysqlclient) handled prepared statements when server connection was lost. A malicious server or a man-in-the-middle attacker could possibly use this flaw to crash an application using libmysqlclient. (CVE-2017-3302)
  • This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pages listed in the References section. (CVE-2016-8327, CVE-2017-3238, CVE-2017-3244, CVE-2017-3257, CVE-2017-3258, CVE-2017-3273, CVE-2017-3308, CVE-2017-3309, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3450, CVE-2017-3452, CVE-2017-3453, CVE-2017-3456, CVE-2017-3461, CVE-2017-3462, CVE-2017-3463, CVE-2017-3464, CVE-2017-3633, CVE-2017-3634, CVE-2017-3636, CVE-2017-3641, CVE-2017-3647, CVE-2017-3648, CVE-2017-3649, CVE-2017-3651, CVE-2017-3652, CVE-2017-3653)

Red Hat would like to thank Pali Rohár for reporting CVE-2017-3305.

Bug Fix(es):

  • Previously, the md5() function was blocked by MySQL in FIPS mode because the MD5 hash algorithm is considered insecure. Consequently, the mysqld daemon failed with error messages when FIPS mode was enabled. With this update, md5() is allowed in FIPS mode for non-security operations. Note that users are able to use md5() for security purposes but such usage is not supported by Red Hat. (BZ#1452469)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.

Affected Products

  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7 x86_64
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6 x86_64
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.5 x86_64
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.4 x86_64
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.3 x86_64
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 6.7 x86_64
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 6 x86_64
  • Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64
  • Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 6 x86_64

Fixes

  • BZ - 1414133 - CVE-2017-3312 mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017)
  • BZ - 1414337 - CVE-2016-8327 mysql: Server: Replication unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414338 - CVE-2017-3238 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414342 - CVE-2017-3244 mysql: Server: DML unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414350 - CVE-2017-3257 mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414351 - CVE-2017-3258 mysql: Server: DDL unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414352 - CVE-2017-3273 mysql: Server: DDL unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414353 - CVE-2017-3313 mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414355 - CVE-2017-3317 mysql: Logging unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414357 - CVE-2017-3318 mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017)
  • BZ - 1414423 - CVE-2017-3265 mysql: unsafe chmod/chown use in init script (CPU Jan 2017)
  • BZ - 1414429 - CVE-2017-3291 mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017)
  • BZ - 1422119 - CVE-2017-3302 mysql: prepared statement handle use-after-free after disconnect
  • BZ - 1431690 - CVE-2017-3305 mysql: incorrect enforcement of ssl-mode=REQUIRED in MySQL 5.5 and 5.6
  • BZ - 1433010 - CVE-2016-5483 CVE-2017-3600 mariadb, mysql: Incorrect input validation allowing code execution via mysqldump
  • BZ - 1443358 - CVE-2017-3308 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443359 - CVE-2017-3309 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443363 - CVE-2017-3450 mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443364 - CVE-2017-3452 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443365 - CVE-2017-3453 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443369 - CVE-2017-3456 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443376 - CVE-2017-3461 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443377 - CVE-2017-3462 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443378 - CVE-2017-3463 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443379 - CVE-2017-3464 mysql: Server: DDL unspecified vulnerability (CPU Apr 2017)
  • BZ - 1443386 - CVE-2017-3599 mysql: integer underflow in get_56_lenc_string() leading to DoS (CPU Apr 2017)
  • BZ - 1472683 - CVE-2017-3633 mysql: Server: Memcached unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472684 - CVE-2017-3634 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472686 - CVE-2017-3636 mysql: Client programs unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472693 - CVE-2017-3641 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472703 - CVE-2017-3647 mysql: Server: Replication unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472704 - CVE-2017-3648 mysql: Server: Charsets unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472705 - CVE-2017-3649 mysql: Server: Replication unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472708 - CVE-2017-3651 mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472710 - CVE-2017-3652 mysql: Server: DDL unspecified vulnerability (CPU Jul 2017)
  • BZ - 1472711 - CVE-2017-3653 mysql: Server: DDL unspecified vulnerability (CPU Jul 2017)
  • BZ - 1477575 - service start fails due to wrong selinux type of logfile
  • BZ - 1482122 - Test case failure: /CoreOS/mysql/Regression/bz1149143-mysql-general-log-doesn-t-work-with-FIFO-file

CVEs

  • CVE-2016-5483
  • CVE-2016-8327
  • CVE-2017-3238
  • CVE-2017-3244
  • CVE-2017-3257
  • CVE-2017-3258
  • CVE-2017-3265
  • CVE-2017-3273
  • CVE-2017-3291
  • CVE-2017-3302
  • CVE-2017-3305
  • CVE-2017-3308
  • CVE-2017-3309
  • CVE-2017-3312
  • CVE-2017-3313
  • CVE-2017-3317
  • CVE-2017-3318
  • CVE-2017-3450
  • CVE-2017-3452
  • CVE-2017-3453
  • CVE-2017-3456
  • CVE-2017-3461
  • CVE-2017-3462
  • CVE-2017-3463
  • CVE-2017-3464
  • CVE-2017-3599
  • CVE-2017-3600
  • CVE-2017-3633
  • CVE-2017-3634
  • CVE-2017-3636
  • CVE-2017-3641
  • CVE-2017-3647
  • CVE-2017-3648
  • CVE-2017-3649
  • CVE-2017-3651
  • CVE-2017-3652
  • CVE-2017-3653

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
  • http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
  • http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
  • https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-35.html
  • https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-36.html
  • https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-37.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7

SRPM
rh-mysql56-mysql-5.6.37-5.el7.src.rpm SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a
x86_64
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6

SRPM
rh-mysql56-mysql-5.6.37-5.el7.src.rpm SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a
x86_64
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.5

SRPM
rh-mysql56-mysql-5.6.37-5.el7.src.rpm SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a
x86_64
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.4

SRPM
rh-mysql56-mysql-5.6.37-5.el7.src.rpm SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a
x86_64
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.3

SRPM
rh-mysql56-mysql-5.6.37-5.el7.src.rpm SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a
x86_64
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7

SRPM
rh-mysql56-mysql-5.6.37-5.el7.src.rpm SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a
x86_64
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc

Red Hat Software Collections (for RHEL Server) 1 for RHEL 6.7

SRPM
rh-mysql56-mysql-5.6.37-5.el6.src.rpm SHA-256: c67f2f8471e11193a976dccaa63ff79334daca664d7125d785a7ac9349aa9084
x86_64
rh-mysql56-mysql-5.6.37-5.el6.x86_64.rpm SHA-256: e4be902b6c69662f53b2044629f52f9c1822aad2eb2a01fdf32d5037bf47b66e
rh-mysql56-mysql-bench-5.6.37-5.el6.x86_64.rpm SHA-256: 96da575c5588af81969ae348e956622bdd86db1548baa4958eed4b3cb28ca5d2
rh-mysql56-mysql-common-5.6.37-5.el6.x86_64.rpm SHA-256: 10515b49458b0aebf82a3c146f85473ec85c3b4c0a712e5b425abb804779bac8
rh-mysql56-mysql-config-5.6.37-5.el6.x86_64.rpm SHA-256: 1c492b1a52edfa8a645ed45e623035b39b950bb1515b0a0db5614c13e4e9abe5
rh-mysql56-mysql-debuginfo-5.6.37-5.el6.x86_64.rpm SHA-256: c6502802199665cc47a7b7a080a9684cd063d7c7bb5aa4c45e5a5fab4c2ef728
rh-mysql56-mysql-devel-5.6.37-5.el6.x86_64.rpm SHA-256: e3b1e0f082b81d825b182e769df8bd63f002e1ba55f1fe609e0c2e73b1a60b8f
rh-mysql56-mysql-errmsg-5.6.37-5.el6.x86_64.rpm SHA-256: 8de20e08bc3e368708913615b20aaa442d60a6d4cf9146a90d6ef90cc7dab3c2
rh-mysql56-mysql-server-5.6.37-5.el6.x86_64.rpm SHA-256: fabe5058c00af38431a840e82a6b9c4f63db480f37568369b6b29a60ab286ac3
rh-mysql56-mysql-test-5.6.37-5.el6.x86_64.rpm SHA-256: 7859f6b6a4b3be2b21c329ea4a2d2449d8575afa4a8b0d531a9db8f6a37cccbf

Red Hat Software Collections (for RHEL Server) 1 for RHEL 6

SRPM
rh-mysql56-mysql-5.6.37-5.el6.src.rpm SHA-256: c67f2f8471e11193a976dccaa63ff79334daca664d7125d785a7ac9349aa9084
x86_64
rh-mysql56-mysql-5.6.37-5.el6.x86_64.rpm SHA-256: e4be902b6c69662f53b2044629f52f9c1822aad2eb2a01fdf32d5037bf47b66e
rh-mysql56-mysql-bench-5.6.37-5.el6.x86_64.rpm SHA-256: 96da575c5588af81969ae348e956622bdd86db1548baa4958eed4b3cb28ca5d2
rh-mysql56-mysql-common-5.6.37-5.el6.x86_64.rpm SHA-256: 10515b49458b0aebf82a3c146f85473ec85c3b4c0a712e5b425abb804779bac8
rh-mysql56-mysql-config-5.6.37-5.el6.x86_64.rpm SHA-256: 1c492b1a52edfa8a645ed45e623035b39b950bb1515b0a0db5614c13e4e9abe5
rh-mysql56-mysql-debuginfo-5.6.37-5.el6.x86_64.rpm SHA-256: c6502802199665cc47a7b7a080a9684cd063d7c7bb5aa4c45e5a5fab4c2ef728
rh-mysql56-mysql-devel-5.6.37-5.el6.x86_64.rpm SHA-256: e3b1e0f082b81d825b182e769df8bd63f002e1ba55f1fe609e0c2e73b1a60b8f
rh-mysql56-mysql-errmsg-5.6.37-5.el6.x86_64.rpm SHA-256: 8de20e08bc3e368708913615b20aaa442d60a6d4cf9146a90d6ef90cc7dab3c2
rh-mysql56-mysql-server-5.6.37-5.el6.x86_64.rpm SHA-256: fabe5058c00af38431a840e82a6b9c4f63db480f37568369b6b29a60ab286ac3
rh-mysql56-mysql-test-5.6.37-5.el6.x86_64.rpm SHA-256: 7859f6b6a4b3be2b21c329ea4a2d2449d8575afa4a8b0d531a9db8f6a37cccbf

Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7

SRPM
rh-mysql56-mysql-5.6.37-5.el7.src.rpm SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a
x86_64
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc

Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 6

SRPM
rh-mysql56-mysql-5.6.37-5.el6.src.rpm SHA-256: c67f2f8471e11193a976dccaa63ff79334daca664d7125d785a7ac9349aa9084
x86_64
rh-mysql56-mysql-5.6.37-5.el6.x86_64.rpm SHA-256: e4be902b6c69662f53b2044629f52f9c1822aad2eb2a01fdf32d5037bf47b66e
rh-mysql56-mysql-bench-5.6.37-5.el6.x86_64.rpm SHA-256: 96da575c5588af81969ae348e956622bdd86db1548baa4958eed4b3cb28ca5d2
rh-mysql56-mysql-common-5.6.37-5.el6.x86_64.rpm SHA-256: 10515b49458b0aebf82a3c146f85473ec85c3b4c0a712e5b425abb804779bac8
rh-mysql56-mysql-config-5.6.37-5.el6.x86_64.rpm SHA-256: 1c492b1a52edfa8a645ed45e623035b39b950bb1515b0a0db5614c13e4e9abe5
rh-mysql56-mysql-debuginfo-5.6.37-5.el6.x86_64.rpm SHA-256: c6502802199665cc47a7b7a080a9684cd063d7c7bb5aa4c45e5a5fab4c2ef728
rh-mysql56-mysql-devel-5.6.37-5.el6.x86_64.rpm SHA-256: e3b1e0f082b81d825b182e769df8bd63f002e1ba55f1fe609e0c2e73b1a60b8f
rh-mysql56-mysql-errmsg-5.6.37-5.el6.x86_64.rpm SHA-256: 8de20e08bc3e368708913615b20aaa442d60a6d4cf9146a90d6ef90cc7dab3c2
rh-mysql56-mysql-server-5.6.37-5.el6.x86_64.rpm SHA-256: fabe5058c00af38431a840e82a6b9c4f63db480f37568369b6b29a60ab286ac3
rh-mysql56-mysql-test-5.6.37-5.el6.x86_64.rpm SHA-256: 7859f6b6a4b3be2b21c329ea4a2d2449d8575afa4a8b0d531a9db8f6a37cccbf

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility