- Issued:
- 2023-03-07
- Updated:
- 2023-03-07
RHSA-2023:1102 - Security Advisory
Synopsis
Moderate: rh-mysql80-mysql security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for rh-mysql80-mysql is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.
The following packages have been upgraded to a later upstream version: rh-mysql80-mysql (8.0.32). (BZ#2142971, BZ#2162319)
Security Fix(es):
- mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21594)
- mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022) (CVE-2022-21599)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2022) (CVE-2022-21604)
- mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21608)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2022) (CVE-2022-21611)
- mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022) (CVE-2022-21617)
- mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21625)
- mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022) (CVE-2022-21632)
- mysql: Server: Replication unspecified vulnerability (CPU Oct 2022) (CVE-2022-21633)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2022) (CVE-2022-21637)
- mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21640)
- mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-39400)
- mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-39408)
- mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-39410)
- mysql: Server: DML unspecified vulnerability (CPU Jan 2023) (CVE-2023-21836)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21863)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21864)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21865)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21867)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21868)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2023) (CVE-2023-21869)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21870)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2023) (CVE-2023-21871)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21873)
- mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023) (CVE-2023-21875)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21876)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2023) (CVE-2023-21877)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21878)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21879)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2023) (CVE-2023-21880)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21881)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21883)
- mysql: Server: GIS unspecified vulnerability (CPU Jan 2023) (CVE-2023-21887)
- mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023) (CVE-2023-21874)
- mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21882)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
Affected Products
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
- Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
- Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
- Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64
Fixes
- BZ - 2142861 - CVE-2022-21594 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
- BZ - 2142863 - CVE-2022-21599 mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022)
- BZ - 2142865 - CVE-2022-21604 mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
- BZ - 2142868 - CVE-2022-21608 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
- BZ - 2142869 - CVE-2022-21611 mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
- BZ - 2142870 - CVE-2022-21617 mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022)
- BZ - 2142871 - CVE-2022-21625 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
- BZ - 2142872 - CVE-2022-21632 mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022)
- BZ - 2142873 - CVE-2022-21633 mysql: Server: Replication unspecified vulnerability (CPU Oct 2022)
- BZ - 2142875 - CVE-2022-21637 mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
- BZ - 2142877 - CVE-2022-21640 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
- BZ - 2142879 - CVE-2022-39400 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
- BZ - 2142880 - CVE-2022-39408 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
- BZ - 2142881 - CVE-2022-39410 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
- BZ - 2162268 - CVE-2023-21836 mysql: Server: DML unspecified vulnerability (CPU Jan 2023)
- BZ - 2162270 - CVE-2023-21863 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162271 - CVE-2023-21864 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162272 - CVE-2023-21865 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162274 - CVE-2023-21867 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162275 - CVE-2023-21868 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162276 - CVE-2023-21869 mysql: InnoDB unspecified vulnerability (CPU Jan 2023)
- BZ - 2162277 - CVE-2023-21870 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162278 - CVE-2023-21871 mysql: InnoDB unspecified vulnerability (CPU Jan 2023)
- BZ - 2162280 - CVE-2023-21873 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162281 - CVE-2023-21874 mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023)
- BZ - 2162282 - CVE-2023-21875 mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023)
- BZ - 2162283 - CVE-2023-21876 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162284 - CVE-2023-21877 mysql: InnoDB unspecified vulnerability (CPU Jan 2023)
- BZ - 2162285 - CVE-2023-21878 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162286 - CVE-2023-21879 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162287 - CVE-2023-21880 mysql: InnoDB unspecified vulnerability (CPU Jan 2023)
- BZ - 2162288 - CVE-2023-21881 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162289 - CVE-2023-21882 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162290 - CVE-2023-21883 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
- BZ - 2162291 - CVE-2023-21887 mysql: Server: GIS unspecified vulnerability (CPU Jan 2023)
CVEs
- CVE-2022-21594
- CVE-2022-21599
- CVE-2022-21604
- CVE-2022-21608
- CVE-2022-21611
- CVE-2022-21617
- CVE-2022-21625
- CVE-2022-21632
- CVE-2022-21633
- CVE-2022-21637
- CVE-2022-21640
- CVE-2022-39400
- CVE-2022-39408
- CVE-2022-39410
- CVE-2023-21836
- CVE-2023-21863
- CVE-2023-21864
- CVE-2023-21865
- CVE-2023-21867
- CVE-2023-21868
- CVE-2023-21869
- CVE-2023-21870
- CVE-2023-21871
- CVE-2023-21873
- CVE-2023-21874
- CVE-2023-21875
- CVE-2023-21876
- CVE-2023-21877
- CVE-2023-21878
- CVE-2023-21879
- CVE-2023-21880
- CVE-2023-21881
- CVE-2023-21882
- CVE-2023-21883
- CVE-2023-21887
- CVE-2023-21912
- CVE-2023-21913
- CVE-2023-21917
- CVE-2023-21963
- CVE-2023-22015
- CVE-2023-22026
- CVE-2023-22028
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7
SRPM | |
---|---|
rh-mysql80-mysql-8.0.32-1.el7.src.rpm | SHA-256: c14e2c7312d8428ab9c0126f4b2636aba7998805bd02b48b5b6d1a63c8c099b1 |
x86_64 | |
rh-mysql80-mysql-8.0.32-1.el7.x86_64.rpm | SHA-256: e7acf1ccd0353a1b23c672337ff57fad486427728468fb92505d77faecc22a8d |
rh-mysql80-mysql-common-8.0.32-1.el7.x86_64.rpm | SHA-256: 47c81fdb84d64b01c76d81f0cad2ffaee3943a8fc5a8cfbfd1a0bb72b238b912 |
rh-mysql80-mysql-config-8.0.32-1.el7.x86_64.rpm | SHA-256: 7672f3d3f27011bf71c9c3b12556363284642a8bee1a5801b8614d049d1643fc |
rh-mysql80-mysql-config-syspaths-8.0.32-1.el7.x86_64.rpm | SHA-256: 9467e9dbc9a455ac806605441ed8f7976e64245d8e3b392eab1a080892483b09 |
rh-mysql80-mysql-debuginfo-8.0.32-1.el7.x86_64.rpm | SHA-256: 5edf578e1180133221c13fae11515fdc0298bbb7d0ab5ad84b13de5628279428 |
rh-mysql80-mysql-devel-8.0.32-1.el7.x86_64.rpm | SHA-256: ce2fe6fe9316a39f8702768f721130ff76b88cfa5ec92741f28a4255ce729cab |
rh-mysql80-mysql-errmsg-8.0.32-1.el7.x86_64.rpm | SHA-256: 32c20da42ca6f40efc9bc73a41abee8b09ab9444173119a2421e42a4b619c3a7 |
rh-mysql80-mysql-icu-data-files-8.0.32-1.el7.x86_64.rpm | SHA-256: 8d82f393da3cef672e2e729f29dd1ad640fa9dbfbfb8172a2959f7a86de81a7f |
rh-mysql80-mysql-server-8.0.32-1.el7.x86_64.rpm | SHA-256: 5a98ea9220482860ee2b773184dadf0b798221a71cb6d2cfd4fe1dfee913c0ca |
rh-mysql80-mysql-server-syspaths-8.0.32-1.el7.x86_64.rpm | SHA-256: b692a9b2c362949650d539bae746fed7cff0c6484df182da3919ea12d1d774df |
rh-mysql80-mysql-syspaths-8.0.32-1.el7.x86_64.rpm | SHA-256: f253edc5ff57a59667d1f6921ec7427cd5f9762c80a94869bf40a7c6ec4ff0fc |
rh-mysql80-mysql-test-8.0.32-1.el7.x86_64.rpm | SHA-256: 21552647fcce253204fa01234b2720e1538fd38522698b357a09971b137a6249 |
Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7
SRPM | |
---|---|
rh-mysql80-mysql-8.0.32-1.el7.src.rpm | SHA-256: c14e2c7312d8428ab9c0126f4b2636aba7998805bd02b48b5b6d1a63c8c099b1 |
s390x | |
rh-mysql80-mysql-8.0.32-1.el7.s390x.rpm | SHA-256: 7ead293c150f48ce43f47ba32c79e126c982fcafe79e58e2522c220e8f895c1c |
rh-mysql80-mysql-common-8.0.32-1.el7.s390x.rpm | SHA-256: 9c27ff87eb7f00869779f1a959893681ea164e5a39167b04d2e70b58dad96f8d |
rh-mysql80-mysql-config-8.0.32-1.el7.s390x.rpm | SHA-256: 008f7ad769e72011bedca556119dbeeb15fca649e2465148962257d7ae34b58c |
rh-mysql80-mysql-config-syspaths-8.0.32-1.el7.s390x.rpm | SHA-256: 2261b3462de4d7b81341d29c3f4ec5aabfec203bc3a7f35877739abeeb6075bf |
rh-mysql80-mysql-debuginfo-8.0.32-1.el7.s390x.rpm | SHA-256: c3d9fff1265ac17deb418bb5e04932947ecd4413e4ab12e246eb774babbee532 |
rh-mysql80-mysql-devel-8.0.32-1.el7.s390x.rpm | SHA-256: b8c6e0bb49cf949124b0b38c7dfa2e90c86a2354e4d6cd6dfdabc4eac5e64f54 |
rh-mysql80-mysql-errmsg-8.0.32-1.el7.s390x.rpm | SHA-256: 1940133b9a819b2bbc3cf67a69832437475a80efa227fbcb63561ee64694c8f3 |
rh-mysql80-mysql-icu-data-files-8.0.32-1.el7.s390x.rpm | SHA-256: 65ae49f34d27ef0b5711b7085ffe013cc0fd5a94faebd30ab172ec9f75b6793a |
rh-mysql80-mysql-server-8.0.32-1.el7.s390x.rpm | SHA-256: 6507687e6f750d3779f12c5e4d031759715f6f06aca4d609a7ab1141ee5b3c9d |
rh-mysql80-mysql-server-syspaths-8.0.32-1.el7.s390x.rpm | SHA-256: 85db390d34549c6a9323d8bf9bea51577c809f0304a6efe91f65ef5bb5583392 |
rh-mysql80-mysql-syspaths-8.0.32-1.el7.s390x.rpm | SHA-256: d1fa3e4e47eace9194ab9f2efb6e7e797cdcaed720e516969d7c8e5f37062a34 |
rh-mysql80-mysql-test-8.0.32-1.el7.s390x.rpm | SHA-256: 3c02193700b8b0d1b74c8eb2dc0a68455c6f47f7d9a604cfa1acbeb337bb0b2e |
Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7
SRPM | |
---|---|
rh-mysql80-mysql-8.0.32-1.el7.src.rpm | SHA-256: c14e2c7312d8428ab9c0126f4b2636aba7998805bd02b48b5b6d1a63c8c099b1 |
ppc64le | |
rh-mysql80-mysql-8.0.32-1.el7.ppc64le.rpm | SHA-256: 0d0ddf4656c226f32bcd4f9d1980212f5b9023c6517d24312357f86e245ad7d2 |
rh-mysql80-mysql-common-8.0.32-1.el7.ppc64le.rpm | SHA-256: 649f9dd1e4153007430273842fd50c9d10ac3d2dd7c4522c8c1e50758a562f7d |
rh-mysql80-mysql-config-8.0.32-1.el7.ppc64le.rpm | SHA-256: e3b7b6f3d5592cfd7b545acc38301e598ed79858cf7f5956ffb9649e3b76fe4c |
rh-mysql80-mysql-config-syspaths-8.0.32-1.el7.ppc64le.rpm | SHA-256: 7ca9710c88ded4f8e65cecfd9a824bfd66743b855e46ab0885b2e21394a5a8f3 |
rh-mysql80-mysql-debuginfo-8.0.32-1.el7.ppc64le.rpm | SHA-256: 39824fb3012ae188c11f721b67ca5ce11571a88ff36c0e9b0934d0dc14cb4ba7 |
rh-mysql80-mysql-devel-8.0.32-1.el7.ppc64le.rpm | SHA-256: 2e6efbc6645a2c1085edd1e016fe9b09c06ab1b9a2727d8d831143c21c434839 |
rh-mysql80-mysql-errmsg-8.0.32-1.el7.ppc64le.rpm | SHA-256: 9c858369839e3d34576aad825e046d8de564038052f306fea49089921ab2f397 |
rh-mysql80-mysql-icu-data-files-8.0.32-1.el7.ppc64le.rpm | SHA-256: 4283bd015df297fa01a0285dc311d2d8be90f132d5e76b0a7b3169e39c12ebab |
rh-mysql80-mysql-server-8.0.32-1.el7.ppc64le.rpm | SHA-256: e5e61493282c0146c487951c9b38972e670f60507d33b0f0b5430092cd2bf30e |
rh-mysql80-mysql-server-syspaths-8.0.32-1.el7.ppc64le.rpm | SHA-256: 8c79fcbbb2ce1dfee2f022f752f23631493dd92041d805db78734b780ba9a936 |
rh-mysql80-mysql-syspaths-8.0.32-1.el7.ppc64le.rpm | SHA-256: 6594caa3862c88a7481a761571cf00862b52976d824c2f376abebcd11bfad18f |
rh-mysql80-mysql-test-8.0.32-1.el7.ppc64le.rpm | SHA-256: 4aada7ee5d130d97bec88d4287554307b1f9ef5b5a508b45f634388526734f27 |
Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7
SRPM | |
---|---|
rh-mysql80-mysql-8.0.32-1.el7.src.rpm | SHA-256: c14e2c7312d8428ab9c0126f4b2636aba7998805bd02b48b5b6d1a63c8c099b1 |
x86_64 | |
rh-mysql80-mysql-8.0.32-1.el7.x86_64.rpm | SHA-256: e7acf1ccd0353a1b23c672337ff57fad486427728468fb92505d77faecc22a8d |
rh-mysql80-mysql-common-8.0.32-1.el7.x86_64.rpm | SHA-256: 47c81fdb84d64b01c76d81f0cad2ffaee3943a8fc5a8cfbfd1a0bb72b238b912 |
rh-mysql80-mysql-config-8.0.32-1.el7.x86_64.rpm | SHA-256: 7672f3d3f27011bf71c9c3b12556363284642a8bee1a5801b8614d049d1643fc |
rh-mysql80-mysql-config-syspaths-8.0.32-1.el7.x86_64.rpm | SHA-256: 9467e9dbc9a455ac806605441ed8f7976e64245d8e3b392eab1a080892483b09 |
rh-mysql80-mysql-debuginfo-8.0.32-1.el7.x86_64.rpm | SHA-256: 5edf578e1180133221c13fae11515fdc0298bbb7d0ab5ad84b13de5628279428 |
rh-mysql80-mysql-devel-8.0.32-1.el7.x86_64.rpm | SHA-256: ce2fe6fe9316a39f8702768f721130ff76b88cfa5ec92741f28a4255ce729cab |
rh-mysql80-mysql-errmsg-8.0.32-1.el7.x86_64.rpm | SHA-256: 32c20da42ca6f40efc9bc73a41abee8b09ab9444173119a2421e42a4b619c3a7 |
rh-mysql80-mysql-icu-data-files-8.0.32-1.el7.x86_64.rpm | SHA-256: 8d82f393da3cef672e2e729f29dd1ad640fa9dbfbfb8172a2959f7a86de81a7f |
rh-mysql80-mysql-server-8.0.32-1.el7.x86_64.rpm | SHA-256: 5a98ea9220482860ee2b773184dadf0b798221a71cb6d2cfd4fe1dfee913c0ca |
rh-mysql80-mysql-server-syspaths-8.0.32-1.el7.x86_64.rpm | SHA-256: b692a9b2c362949650d539bae746fed7cff0c6484df182da3919ea12d1d774df |
rh-mysql80-mysql-syspaths-8.0.32-1.el7.x86_64.rpm | SHA-256: f253edc5ff57a59667d1f6921ec7427cd5f9762c80a94869bf40a7c6ec4ff0fc |
rh-mysql80-mysql-test-8.0.32-1.el7.x86_64.rpm | SHA-256: 21552647fcce253204fa01234b2720e1538fd38522698b357a09971b137a6249 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.