- Issued:
- 2017-09-21
- Updated:
- 2017-09-21
RHSA-2017:2787 - Security Advisory
Synopsis
Important: rh-mysql56-mysql security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for rh-mysql56-mysql is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.
The following packages have been upgraded to a later upstream version: rh-mysql56-mysql (5.6.37).
Security Fix(es):
- An integer overflow flaw leading to a buffer overflow was found in the way MySQL parsed connection handshake packets. An unauthenticated remote attacker with access to the MySQL port could use this flaw to crash the mysqld daemon. (CVE-2017-3599)
- It was discovered that the mysql and mysqldump tools did not correctly handle database and table names containing newline characters. A database user with privileges to create databases or tables could cause the mysql command to execute arbitrary shell or SQL commands while restoring database backup created using the mysqldump tool. (CVE-2016-5483, CVE-2017-3600)
- Multiple flaws were found in the way the MySQL init script handled initialization of the database data directory and permission setting on the error log file. The mysql operating system user could use these flaws to escalate their privileges to root. (CVE-2017-3265)
- It was discovered that the mysqld_safe script honored the ledir option value set in a MySQL configuration file. A user able to modify one of the MySQL configuration files could use this flaw to escalate their privileges to root. (CVE-2017-3291)
- It was discovered that the MySQL client command line tools only checked after authentication whether server supported SSL. A man-in-the-middle attacker could use this flaw to hijack client's authentication to the server even if the client was configured to require SSL connection. (CVE-2017-3305)
- Multiple flaws were found in the way the mysqld_safe script handled creation of error log file. The mysql operating system user could use these flaws to escalate their privileges to root. (CVE-2017-3312)
- A flaw was found in the way MySQL client library (libmysqlclient) handled prepared statements when server connection was lost. A malicious server or a man-in-the-middle attacker could possibly use this flaw to crash an application using libmysqlclient. (CVE-2017-3302)
- This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pages listed in the References section. (CVE-2016-8327, CVE-2017-3238, CVE-2017-3244, CVE-2017-3257, CVE-2017-3258, CVE-2017-3273, CVE-2017-3308, CVE-2017-3309, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3450, CVE-2017-3452, CVE-2017-3453, CVE-2017-3456, CVE-2017-3461, CVE-2017-3462, CVE-2017-3463, CVE-2017-3464, CVE-2017-3633, CVE-2017-3634, CVE-2017-3636, CVE-2017-3641, CVE-2017-3647, CVE-2017-3648, CVE-2017-3649, CVE-2017-3651, CVE-2017-3652, CVE-2017-3653)
Red Hat would like to thank Pali Rohár for reporting CVE-2017-3305.
Bug Fix(es):
- Previously, the md5() function was blocked by MySQL in FIPS mode because the MD5 hash algorithm is considered insecure. Consequently, the mysqld daemon failed with error messages when FIPS mode was enabled. With this update, md5() is allowed in FIPS mode for non-security operations. Note that users are able to use md5() for security purposes but such usage is not supported by Red Hat. (BZ#1452469)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
Affected Products
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.5 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.4 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.3 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 6.7 x86_64
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 6 x86_64
- Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64
- Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 6 x86_64
Fixes
- BZ - 1414133 - CVE-2017-3312 mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017)
- BZ - 1414337 - CVE-2016-8327 mysql: Server: Replication unspecified vulnerability (CPU Jan 2017)
- BZ - 1414338 - CVE-2017-3238 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017)
- BZ - 1414342 - CVE-2017-3244 mysql: Server: DML unspecified vulnerability (CPU Jan 2017)
- BZ - 1414350 - CVE-2017-3257 mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017)
- BZ - 1414351 - CVE-2017-3258 mysql: Server: DDL unspecified vulnerability (CPU Jan 2017)
- BZ - 1414352 - CVE-2017-3273 mysql: Server: DDL unspecified vulnerability (CPU Jan 2017)
- BZ - 1414353 - CVE-2017-3313 mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017)
- BZ - 1414355 - CVE-2017-3317 mysql: Logging unspecified vulnerability (CPU Jan 2017)
- BZ - 1414357 - CVE-2017-3318 mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017)
- BZ - 1414423 - CVE-2017-3265 mysql: unsafe chmod/chown use in init script (CPU Jan 2017)
- BZ - 1414429 - CVE-2017-3291 mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017)
- BZ - 1422119 - CVE-2017-3302 mysql: prepared statement handle use-after-free after disconnect
- BZ - 1431690 - CVE-2017-3305 mysql: incorrect enforcement of ssl-mode=REQUIRED in MySQL 5.5 and 5.6
- BZ - 1433010 - CVE-2016-5483 CVE-2017-3600 mariadb, mysql: Incorrect input validation allowing code execution via mysqldump
- BZ - 1443358 - CVE-2017-3308 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
- BZ - 1443359 - CVE-2017-3309 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
- BZ - 1443363 - CVE-2017-3450 mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017)
- BZ - 1443364 - CVE-2017-3452 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
- BZ - 1443365 - CVE-2017-3453 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
- BZ - 1443369 - CVE-2017-3456 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
- BZ - 1443376 - CVE-2017-3461 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
- BZ - 1443377 - CVE-2017-3462 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
- BZ - 1443378 - CVE-2017-3463 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
- BZ - 1443379 - CVE-2017-3464 mysql: Server: DDL unspecified vulnerability (CPU Apr 2017)
- BZ - 1443386 - CVE-2017-3599 mysql: integer underflow in get_56_lenc_string() leading to DoS (CPU Apr 2017)
- BZ - 1472683 - CVE-2017-3633 mysql: Server: Memcached unspecified vulnerability (CPU Jul 2017)
- BZ - 1472684 - CVE-2017-3634 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
- BZ - 1472686 - CVE-2017-3636 mysql: Client programs unspecified vulnerability (CPU Jul 2017)
- BZ - 1472693 - CVE-2017-3641 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
- BZ - 1472703 - CVE-2017-3647 mysql: Server: Replication unspecified vulnerability (CPU Jul 2017)
- BZ - 1472704 - CVE-2017-3648 mysql: Server: Charsets unspecified vulnerability (CPU Jul 2017)
- BZ - 1472705 - CVE-2017-3649 mysql: Server: Replication unspecified vulnerability (CPU Jul 2017)
- BZ - 1472708 - CVE-2017-3651 mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
- BZ - 1472710 - CVE-2017-3652 mysql: Server: DDL unspecified vulnerability (CPU Jul 2017)
- BZ - 1472711 - CVE-2017-3653 mysql: Server: DDL unspecified vulnerability (CPU Jul 2017)
- BZ - 1477575 - service start fails due to wrong selinux type of logfile
- BZ - 1482122 - Test case failure: /CoreOS/mysql/Regression/bz1149143-mysql-general-log-doesn-t-work-with-FIFO-file
CVEs
- CVE-2016-5483
- CVE-2016-8327
- CVE-2017-3238
- CVE-2017-3244
- CVE-2017-3257
- CVE-2017-3258
- CVE-2017-3265
- CVE-2017-3273
- CVE-2017-3291
- CVE-2017-3302
- CVE-2017-3305
- CVE-2017-3308
- CVE-2017-3309
- CVE-2017-3312
- CVE-2017-3313
- CVE-2017-3317
- CVE-2017-3318
- CVE-2017-3450
- CVE-2017-3452
- CVE-2017-3453
- CVE-2017-3456
- CVE-2017-3461
- CVE-2017-3462
- CVE-2017-3463
- CVE-2017-3464
- CVE-2017-3599
- CVE-2017-3600
- CVE-2017-3633
- CVE-2017-3634
- CVE-2017-3636
- CVE-2017-3641
- CVE-2017-3647
- CVE-2017-3648
- CVE-2017-3649
- CVE-2017-3651
- CVE-2017-3652
- CVE-2017-3653
References
- https://access.redhat.com/security/updates/classification/#important
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL
- https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-35.html
- https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-36.html
- https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-37.html
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el7.src.rpm | SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm | SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8 |
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm | SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582 |
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm | SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e |
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm | SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm | SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51 |
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm | SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d |
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm | SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3 |
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm | SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2 |
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm | SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el7.src.rpm | SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm | SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8 |
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm | SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582 |
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm | SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e |
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm | SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm | SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51 |
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm | SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d |
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm | SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3 |
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm | SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2 |
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm | SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.5
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el7.src.rpm | SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm | SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8 |
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm | SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582 |
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm | SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e |
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm | SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm | SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51 |
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm | SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d |
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm | SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3 |
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm | SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2 |
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm | SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.4
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el7.src.rpm | SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm | SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8 |
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm | SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582 |
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm | SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e |
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm | SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm | SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51 |
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm | SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d |
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm | SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3 |
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm | SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2 |
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm | SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.3
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el7.src.rpm | SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm | SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8 |
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm | SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582 |
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm | SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e |
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm | SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm | SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51 |
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm | SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d |
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm | SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3 |
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm | SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2 |
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm | SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el7.src.rpm | SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm | SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8 |
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm | SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582 |
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm | SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e |
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm | SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm | SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51 |
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm | SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d |
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm | SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3 |
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm | SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2 |
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm | SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 6.7
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el6.src.rpm | SHA-256: c67f2f8471e11193a976dccaa63ff79334daca664d7125d785a7ac9349aa9084 |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el6.x86_64.rpm | SHA-256: e4be902b6c69662f53b2044629f52f9c1822aad2eb2a01fdf32d5037bf47b66e |
rh-mysql56-mysql-bench-5.6.37-5.el6.x86_64.rpm | SHA-256: 96da575c5588af81969ae348e956622bdd86db1548baa4958eed4b3cb28ca5d2 |
rh-mysql56-mysql-common-5.6.37-5.el6.x86_64.rpm | SHA-256: 10515b49458b0aebf82a3c146f85473ec85c3b4c0a712e5b425abb804779bac8 |
rh-mysql56-mysql-config-5.6.37-5.el6.x86_64.rpm | SHA-256: 1c492b1a52edfa8a645ed45e623035b39b950bb1515b0a0db5614c13e4e9abe5 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el6.x86_64.rpm | SHA-256: c6502802199665cc47a7b7a080a9684cd063d7c7bb5aa4c45e5a5fab4c2ef728 |
rh-mysql56-mysql-devel-5.6.37-5.el6.x86_64.rpm | SHA-256: e3b1e0f082b81d825b182e769df8bd63f002e1ba55f1fe609e0c2e73b1a60b8f |
rh-mysql56-mysql-errmsg-5.6.37-5.el6.x86_64.rpm | SHA-256: 8de20e08bc3e368708913615b20aaa442d60a6d4cf9146a90d6ef90cc7dab3c2 |
rh-mysql56-mysql-server-5.6.37-5.el6.x86_64.rpm | SHA-256: fabe5058c00af38431a840e82a6b9c4f63db480f37568369b6b29a60ab286ac3 |
rh-mysql56-mysql-test-5.6.37-5.el6.x86_64.rpm | SHA-256: 7859f6b6a4b3be2b21c329ea4a2d2449d8575afa4a8b0d531a9db8f6a37cccbf |
Red Hat Software Collections (for RHEL Server) 1 for RHEL 6
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el6.src.rpm | SHA-256: c67f2f8471e11193a976dccaa63ff79334daca664d7125d785a7ac9349aa9084 |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el6.x86_64.rpm | SHA-256: e4be902b6c69662f53b2044629f52f9c1822aad2eb2a01fdf32d5037bf47b66e |
rh-mysql56-mysql-bench-5.6.37-5.el6.x86_64.rpm | SHA-256: 96da575c5588af81969ae348e956622bdd86db1548baa4958eed4b3cb28ca5d2 |
rh-mysql56-mysql-common-5.6.37-5.el6.x86_64.rpm | SHA-256: 10515b49458b0aebf82a3c146f85473ec85c3b4c0a712e5b425abb804779bac8 |
rh-mysql56-mysql-config-5.6.37-5.el6.x86_64.rpm | SHA-256: 1c492b1a52edfa8a645ed45e623035b39b950bb1515b0a0db5614c13e4e9abe5 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el6.x86_64.rpm | SHA-256: c6502802199665cc47a7b7a080a9684cd063d7c7bb5aa4c45e5a5fab4c2ef728 |
rh-mysql56-mysql-devel-5.6.37-5.el6.x86_64.rpm | SHA-256: e3b1e0f082b81d825b182e769df8bd63f002e1ba55f1fe609e0c2e73b1a60b8f |
rh-mysql56-mysql-errmsg-5.6.37-5.el6.x86_64.rpm | SHA-256: 8de20e08bc3e368708913615b20aaa442d60a6d4cf9146a90d6ef90cc7dab3c2 |
rh-mysql56-mysql-server-5.6.37-5.el6.x86_64.rpm | SHA-256: fabe5058c00af38431a840e82a6b9c4f63db480f37568369b6b29a60ab286ac3 |
rh-mysql56-mysql-test-5.6.37-5.el6.x86_64.rpm | SHA-256: 7859f6b6a4b3be2b21c329ea4a2d2449d8575afa4a8b0d531a9db8f6a37cccbf |
Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el7.src.rpm | SHA-256: e6571cb3986b70d384f0f0f7ff94d3309bd170f3de1aa32817006296dab4ae8a |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el7.x86_64.rpm | SHA-256: 0856a9dd23ba8868b9f93570f9e953f4b6e7c3d9572ba71ad3cd325dd34502a8 |
rh-mysql56-mysql-bench-5.6.37-5.el7.x86_64.rpm | SHA-256: 9ba874bf045f03e1376678f4e957e99c917daaa1f39e1fac373352b7b4b36582 |
rh-mysql56-mysql-common-5.6.37-5.el7.x86_64.rpm | SHA-256: 7e823848371cbfa40ef581e62409b750b8b3741762e47b1acdcd3da2d7d0cf5e |
rh-mysql56-mysql-config-5.6.37-5.el7.x86_64.rpm | SHA-256: d4b7e4d1479bfd6850982e48d41f1076e4ad88c658dc76f9b650f1704eb53b66 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el7.x86_64.rpm | SHA-256: 0ee91aac96af35c0a48ea79d66c78c3a19a4d750801f42246cf992550d747d51 |
rh-mysql56-mysql-devel-5.6.37-5.el7.x86_64.rpm | SHA-256: 072f9282286a0642847602984809ce3d39a713abebc23b964eee6ed50c72296d |
rh-mysql56-mysql-errmsg-5.6.37-5.el7.x86_64.rpm | SHA-256: 86e9fa8cbecc84597e7f9a2097ff0366a46fb0064b85f0daf0db79150443dec3 |
rh-mysql56-mysql-server-5.6.37-5.el7.x86_64.rpm | SHA-256: f33d84469e406158e7b23a0fb73184daf308ff174340be650354c98a215f73e2 |
rh-mysql56-mysql-test-5.6.37-5.el7.x86_64.rpm | SHA-256: b8207e3eb2bff2d5a4eb88f6389f50fda816ee0dc3e43f375450652fb3155fcc |
Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 6
SRPM | |
---|---|
rh-mysql56-mysql-5.6.37-5.el6.src.rpm | SHA-256: c67f2f8471e11193a976dccaa63ff79334daca664d7125d785a7ac9349aa9084 |
x86_64 | |
rh-mysql56-mysql-5.6.37-5.el6.x86_64.rpm | SHA-256: e4be902b6c69662f53b2044629f52f9c1822aad2eb2a01fdf32d5037bf47b66e |
rh-mysql56-mysql-bench-5.6.37-5.el6.x86_64.rpm | SHA-256: 96da575c5588af81969ae348e956622bdd86db1548baa4958eed4b3cb28ca5d2 |
rh-mysql56-mysql-common-5.6.37-5.el6.x86_64.rpm | SHA-256: 10515b49458b0aebf82a3c146f85473ec85c3b4c0a712e5b425abb804779bac8 |
rh-mysql56-mysql-config-5.6.37-5.el6.x86_64.rpm | SHA-256: 1c492b1a52edfa8a645ed45e623035b39b950bb1515b0a0db5614c13e4e9abe5 |
rh-mysql56-mysql-debuginfo-5.6.37-5.el6.x86_64.rpm | SHA-256: c6502802199665cc47a7b7a080a9684cd063d7c7bb5aa4c45e5a5fab4c2ef728 |
rh-mysql56-mysql-devel-5.6.37-5.el6.x86_64.rpm | SHA-256: e3b1e0f082b81d825b182e769df8bd63f002e1ba55f1fe609e0c2e73b1a60b8f |
rh-mysql56-mysql-errmsg-5.6.37-5.el6.x86_64.rpm | SHA-256: 8de20e08bc3e368708913615b20aaa442d60a6d4cf9146a90d6ef90cc7dab3c2 |
rh-mysql56-mysql-server-5.6.37-5.el6.x86_64.rpm | SHA-256: fabe5058c00af38431a840e82a6b9c4f63db480f37568369b6b29a60ab286ac3 |
rh-mysql56-mysql-test-5.6.37-5.el6.x86_64.rpm | SHA-256: 7859f6b6a4b3be2b21c329ea4a2d2449d8575afa4a8b0d531a9db8f6a37cccbf |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.