var-201904-0029
Vulnerability from variot

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). Oracle MySQL is an open source relational database management system from Oracle Corporation of the United States. An attacker could use this vulnerability to cause a denial of service (hang or frequent crashes), affecting the availability of data. These vulnerabilities can be exploited over 'MySQL Protocol' protocol. 8) - aarch64, ppc64le, s390x, x86_64

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Important: rh-mysql80-mysql security update Advisory ID: RHSA-2019:2484-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2019:2484 Issue date: 2019-08-14 CVE Names: CVE-2019-2420 CVE-2019-2434 CVE-2019-2436 CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 CVE-2019-2486 CVE-2019-2494 CVE-2019-2495 CVE-2019-2502 CVE-2019-2503 CVE-2019-2507 CVE-2019-2510 CVE-2019-2528 CVE-2019-2529 CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 CVE-2019-2580 CVE-2019-2581 CVE-2019-2584 CVE-2019-2585 CVE-2019-2587 CVE-2019-2589 CVE-2019-2592 CVE-2019-2593 CVE-2019-2596 CVE-2019-2606 CVE-2019-2607 CVE-2019-2614 CVE-2019-2617 CVE-2019-2620 CVE-2019-2623 CVE-2019-2624 CVE-2019-2625 CVE-2019-2626 CVE-2019-2627 CVE-2019-2628 CVE-2019-2630 CVE-2019-2631 CVE-2019-2634 CVE-2019-2635 CVE-2019-2636 CVE-2019-2644 CVE-2019-2681 CVE-2019-2683 CVE-2019-2685 CVE-2019-2686 CVE-2019-2687 CVE-2019-2688 CVE-2019-2689 CVE-2019-2691 CVE-2019-2693 CVE-2019-2694 CVE-2019-2695 CVE-2019-2737 CVE-2019-2738 CVE-2019-2739 CVE-2019-2740 CVE-2019-2752 CVE-2019-2755 CVE-2019-2757 CVE-2019-2758 CVE-2019-2774 CVE-2019-2778 CVE-2019-2780 CVE-2019-2784 CVE-2019-2785 CVE-2019-2789 CVE-2019-2795 CVE-2019-2796 CVE-2019-2797 CVE-2019-2798 CVE-2019-2800 CVE-2019-2801 CVE-2019-2802 CVE-2019-2803 CVE-2019-2805 CVE-2019-2808 CVE-2019-2810 CVE-2019-2811 CVE-2019-2812 CVE-2019-2814 CVE-2019-2815 CVE-2019-2819 CVE-2019-2826 CVE-2019-2830 CVE-2019-2834 CVE-2019-2879 =====================================================================

  1. Summary:

An update for rh-mysql80-mysql is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64

The following packages have been upgraded to a later upstream version: rh-mysql80-mysql (8.0.17).

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.

  1. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm

aarch64: rh-mysql80-mysql-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.aarch64.rpm

ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm

aarch64: rh-mysql80-mysql-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.aarch64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.aarch64.rpm

ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):

Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm

ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):

Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm

ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):

Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm

ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):

Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm

ppc64le: rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x: rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source: rh-mysql80-mysql-8.0.17-1.el7.src.rpm

x86_64: rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2019-2420 https://access.redhat.com/security/cve/CVE-2019-2434 https://access.redhat.com/security/cve/CVE-2019-2436 https://access.redhat.com/security/cve/CVE-2019-2455 https://access.redhat.com/security/cve/CVE-2019-2481 https://access.redhat.com/security/cve/CVE-2019-2482 https://access.redhat.com/security/cve/CVE-2019-2486 https://access.redhat.com/security/cve/CVE-2019-2494 https://access.redhat.com/security/cve/CVE-2019-2495 https://access.redhat.com/security/cve/CVE-2019-2502 https://access.redhat.com/security/cve/CVE-2019-2503 https://access.redhat.com/security/cve/CVE-2019-2507 https://access.redhat.com/security/cve/CVE-2019-2510 https://access.redhat.com/security/cve/CVE-2019-2528 https://access.redhat.com/security/cve/CVE-2019-2529 https://access.redhat.com/security/cve/CVE-2019-2530 https://access.redhat.com/security/cve/CVE-2019-2531 https://access.redhat.com/security/cve/CVE-2019-2532 https://access.redhat.com/security/cve/CVE-2019-2533 https://access.redhat.com/security/cve/CVE-2019-2534 https://access.redhat.com/security/cve/CVE-2019-2535 https://access.redhat.com/security/cve/CVE-2019-2536 https://access.redhat.com/security/cve/CVE-2019-2537 https://access.redhat.com/security/cve/CVE-2019-2539 https://access.redhat.com/security/cve/CVE-2019-2580 https://access.redhat.com/security/cve/CVE-2019-2581 https://access.redhat.com/security/cve/CVE-2019-2584 https://access.redhat.com/security/cve/CVE-2019-2585 https://access.redhat.com/security/cve/CVE-2019-2587 https://access.redhat.com/security/cve/CVE-2019-2589 https://access.redhat.com/security/cve/CVE-2019-2592 https://access.redhat.com/security/cve/CVE-2019-2593 https://access.redhat.com/security/cve/CVE-2019-2596 https://access.redhat.com/security/cve/CVE-2019-2606 https://access.redhat.com/security/cve/CVE-2019-2607 https://access.redhat.com/security/cve/CVE-2019-2614 https://access.redhat.com/security/cve/CVE-2019-2617 https://access.redhat.com/security/cve/CVE-2019-2620 https://access.redhat.com/security/cve/CVE-2019-2623 https://access.redhat.com/security/cve/CVE-2019-2624 https://access.redhat.com/security/cve/CVE-2019-2625 https://access.redhat.com/security/cve/CVE-2019-2626 https://access.redhat.com/security/cve/CVE-2019-2627 https://access.redhat.com/security/cve/CVE-2019-2628 https://access.redhat.com/security/cve/CVE-2019-2630 https://access.redhat.com/security/cve/CVE-2019-2631 https://access.redhat.com/security/cve/CVE-2019-2634 https://access.redhat.com/security/cve/CVE-2019-2635 https://access.redhat.com/security/cve/CVE-2019-2636 https://access.redhat.com/security/cve/CVE-2019-2644 https://access.redhat.com/security/cve/CVE-2019-2681 https://access.redhat.com/security/cve/CVE-2019-2683 https://access.redhat.com/security/cve/CVE-2019-2685 https://access.redhat.com/security/cve/CVE-2019-2686 https://access.redhat.com/security/cve/CVE-2019-2687 https://access.redhat.com/security/cve/CVE-2019-2688 https://access.redhat.com/security/cve/CVE-2019-2689 https://access.redhat.com/security/cve/CVE-2019-2691 https://access.redhat.com/security/cve/CVE-2019-2693 https://access.redhat.com/security/cve/CVE-2019-2694 https://access.redhat.com/security/cve/CVE-2019-2695 https://access.redhat.com/security/cve/CVE-2019-2737 https://access.redhat.com/security/cve/CVE-2019-2738 https://access.redhat.com/security/cve/CVE-2019-2739 https://access.redhat.com/security/cve/CVE-2019-2740 https://access.redhat.com/security/cve/CVE-2019-2752 https://access.redhat.com/security/cve/CVE-2019-2755 https://access.redhat.com/security/cve/CVE-2019-2757 https://access.redhat.com/security/cve/CVE-2019-2758 https://access.redhat.com/security/cve/CVE-2019-2774 https://access.redhat.com/security/cve/CVE-2019-2778 https://access.redhat.com/security/cve/CVE-2019-2780 https://access.redhat.com/security/cve/CVE-2019-2784 https://access.redhat.com/security/cve/CVE-2019-2785 https://access.redhat.com/security/cve/CVE-2019-2789 https://access.redhat.com/security/cve/CVE-2019-2795 https://access.redhat.com/security/cve/CVE-2019-2796 https://access.redhat.com/security/cve/CVE-2019-2797 https://access.redhat.com/security/cve/CVE-2019-2798 https://access.redhat.com/security/cve/CVE-2019-2800 https://access.redhat.com/security/cve/CVE-2019-2801 https://access.redhat.com/security/cve/CVE-2019-2802 https://access.redhat.com/security/cve/CVE-2019-2803 https://access.redhat.com/security/cve/CVE-2019-2805 https://access.redhat.com/security/cve/CVE-2019-2808 https://access.redhat.com/security/cve/CVE-2019-2810 https://access.redhat.com/security/cve/CVE-2019-2811 https://access.redhat.com/security/cve/CVE-2019-2812 https://access.redhat.com/security/cve/CVE-2019-2814 https://access.redhat.com/security/cve/CVE-2019-2815 https://access.redhat.com/security/cve/CVE-2019-2819 https://access.redhat.com/security/cve/CVE-2019-2826 https://access.redhat.com/security/cve/CVE-2019-2830 https://access.redhat.com/security/cve/CVE-2019-2834 https://access.redhat.com/security/cve/CVE-2019-2879 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBXVOxPNzjgjWX9erEAQjMXA/9Eihmyr36juKBY8YJ6hqFuMlWDEtXH/uI /6z1r6cjHcLr4FU+qbt/q8lqQ/mKFBrfYgPrZe6RugoC52B4U4Zkt78Vy0WH4uFJ dh2C6eR2IwFp/avJD3m8vaDTL6aHHXOYSiGJCegg5kjmZyXMWHgI6/bVhprwy1k8 +IXNSF9L87Ww/4teTv7L1eKchstpzZd+7V+ZS6JeaD1Cxu6vYV+Nrbo/J3362h1K 3Zf/aromzPBEl9XXzmqJawN/t1twTp2XAhV8is4FzkQ0XAy/0IoFc/GP34MHYZ2R vwyeVehCmwtHBH8JrViQGE5HgeaE8fs7g3DqIefJmswB+NsYvw1rybPtgOhpew+W MIZaKrzFuiYIl3VQMR5VT2ZVerwglle1uP2x/gYvm4LZsqfdJcwBCFiJhDITQ2cw ZKdlBAs3MJtkJJpWn1kAIKcblmUXU4LRZkJtIH+VBpr0NLQVGwJ2UG93jD7Y74tI 3AH1YAaKHXuAjlpDw4qcWQsPnbegPaWesffkNty6+aLdt4y8nJ8IQWm5aMqSU5xW +6MQ9sf2qIRLYj+RFtNQJP+K0sK32DJjtrZuLDWD2Fhg9w9XG6SZxuSTxfVstBqi M42OspadVMdFto1IQuv9/9I7cS9l5srfVnjq7kO6yuENIm7/tJX+tjU4jagbfZ3L zLIpZwaofO8= =dahN -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0029",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mysql",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "oracle",
        "version": "8.0.15"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.6"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.4"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.6"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.0"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.6"
      },
      {
        "model": "mysql",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.0.0"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.2"
      },
      {
        "model": "software collections",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "1.0"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "8.1"
      },
      {
        "model": "mysql server",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "oracle",
        "version": "\u003c=8.0.15"
      },
      {
        "model": "mysql server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.0.15"
      },
      {
        "model": "mysql server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.0.14"
      },
      {
        "model": "mysql server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.0.13"
      },
      {
        "model": "mysql server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.0.12"
      },
      {
        "model": "mysql server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.0.11"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "db": "BID",
        "id": "107913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2686"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "8.0.15",
                "versionStartIncluding": "8.0.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2686"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Oracle",
    "sources": [
      {
        "db": "BID",
        "id": "107913"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2019-2686",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 4.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-2686",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-11756",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.2,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 4.9,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-2686",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2019-2686",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-11756",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201904-674",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2686"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). Oracle MySQL is an open source relational database management system from Oracle Corporation of the United States. An attacker could use this vulnerability to cause a denial of service (hang or frequent crashes), affecting the availability of data. \nThese vulnerabilities can be exploited over \u0027MySQL Protocol\u0027 protocol. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: rh-mysql80-mysql security update\nAdvisory ID:       RHSA-2019:2484-01\nProduct:           Red Hat Software Collections\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2019:2484\nIssue date:        2019-08-14\nCVE Names:         CVE-2019-2420 CVE-2019-2434 CVE-2019-2436 \n                   CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 \n                   CVE-2019-2486 CVE-2019-2494 CVE-2019-2495 \n                   CVE-2019-2502 CVE-2019-2503 CVE-2019-2507 \n                   CVE-2019-2510 CVE-2019-2528 CVE-2019-2529 \n                   CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 \n                   CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 \n                   CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 \n                   CVE-2019-2580 CVE-2019-2581 CVE-2019-2584 \n                   CVE-2019-2585 CVE-2019-2587 CVE-2019-2589 \n                   CVE-2019-2592 CVE-2019-2593 CVE-2019-2596 \n                   CVE-2019-2606 CVE-2019-2607 CVE-2019-2614 \n                   CVE-2019-2617 CVE-2019-2620 CVE-2019-2623 \n                   CVE-2019-2624 CVE-2019-2625 CVE-2019-2626 \n                   CVE-2019-2627 CVE-2019-2628 CVE-2019-2630 \n                   CVE-2019-2631 CVE-2019-2634 CVE-2019-2635 \n                   CVE-2019-2636 CVE-2019-2644 CVE-2019-2681 \n                   CVE-2019-2683 CVE-2019-2685 CVE-2019-2686 \n                   CVE-2019-2687 CVE-2019-2688 CVE-2019-2689 \n                   CVE-2019-2691 CVE-2019-2693 CVE-2019-2694 \n                   CVE-2019-2695 CVE-2019-2737 CVE-2019-2738 \n                   CVE-2019-2739 CVE-2019-2740 CVE-2019-2752 \n                   CVE-2019-2755 CVE-2019-2757 CVE-2019-2758 \n                   CVE-2019-2774 CVE-2019-2778 CVE-2019-2780 \n                   CVE-2019-2784 CVE-2019-2785 CVE-2019-2789 \n                   CVE-2019-2795 CVE-2019-2796 CVE-2019-2797 \n                   CVE-2019-2798 CVE-2019-2800 CVE-2019-2801 \n                   CVE-2019-2802 CVE-2019-2803 CVE-2019-2805 \n                   CVE-2019-2808 CVE-2019-2810 CVE-2019-2811 \n                   CVE-2019-2812 CVE-2019-2814 CVE-2019-2815 \n                   CVE-2019-2819 CVE-2019-2826 CVE-2019-2830 \n                   CVE-2019-2834 CVE-2019-2879 \n=====================================================================\n\n1. Summary:\n\nAn update for rh-mysql80-mysql is now available for Red Hat Software\nCollections. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64le, s390x, x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. \n\nThe following packages have been upgraded to a later upstream version:\nrh-mysql80-mysql (8.0.17). \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the MySQL server daemon (mysqld) will be\nrestarted automatically. \n\n5. Package List:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-mysql80-mysql-8.0.17-1.el7.src.rpm\n\naarch64:\nrh-mysql80-mysql-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.aarch64.rpm\n\nppc64le:\nrh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm\n\ns390x:\nrh-mysql80-mysql-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-mysql80-mysql-8.0.17-1.el7.src.rpm\n\naarch64:\nrh-mysql80-mysql-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.aarch64.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.aarch64.rpm\n\nppc64le:\nrh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm\n\ns390x:\nrh-mysql80-mysql-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm\n\nx86_64:\nrh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):\n\nSource:\nrh-mysql80-mysql-8.0.17-1.el7.src.rpm\n\nppc64le:\nrh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm\n\ns390x:\nrh-mysql80-mysql-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm\n\nx86_64:\nrh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):\n\nSource:\nrh-mysql80-mysql-8.0.17-1.el7.src.rpm\n\nppc64le:\nrh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm\n\ns390x:\nrh-mysql80-mysql-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm\n\nx86_64:\nrh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):\n\nSource:\nrh-mysql80-mysql-8.0.17-1.el7.src.rpm\n\nppc64le:\nrh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm\n\ns390x:\nrh-mysql80-mysql-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm\n\nx86_64:\nrh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):\n\nSource:\nrh-mysql80-mysql-8.0.17-1.el7.src.rpm\n\nppc64le:\nrh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm\n\ns390x:\nrh-mysql80-mysql-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm\n\nx86_64:\nrh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-mysql80-mysql-8.0.17-1.el7.src.rpm\n\nx86_64:\nrh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm\nrh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-2420\nhttps://access.redhat.com/security/cve/CVE-2019-2434\nhttps://access.redhat.com/security/cve/CVE-2019-2436\nhttps://access.redhat.com/security/cve/CVE-2019-2455\nhttps://access.redhat.com/security/cve/CVE-2019-2481\nhttps://access.redhat.com/security/cve/CVE-2019-2482\nhttps://access.redhat.com/security/cve/CVE-2019-2486\nhttps://access.redhat.com/security/cve/CVE-2019-2494\nhttps://access.redhat.com/security/cve/CVE-2019-2495\nhttps://access.redhat.com/security/cve/CVE-2019-2502\nhttps://access.redhat.com/security/cve/CVE-2019-2503\nhttps://access.redhat.com/security/cve/CVE-2019-2507\nhttps://access.redhat.com/security/cve/CVE-2019-2510\nhttps://access.redhat.com/security/cve/CVE-2019-2528\nhttps://access.redhat.com/security/cve/CVE-2019-2529\nhttps://access.redhat.com/security/cve/CVE-2019-2530\nhttps://access.redhat.com/security/cve/CVE-2019-2531\nhttps://access.redhat.com/security/cve/CVE-2019-2532\nhttps://access.redhat.com/security/cve/CVE-2019-2533\nhttps://access.redhat.com/security/cve/CVE-2019-2534\nhttps://access.redhat.com/security/cve/CVE-2019-2535\nhttps://access.redhat.com/security/cve/CVE-2019-2536\nhttps://access.redhat.com/security/cve/CVE-2019-2537\nhttps://access.redhat.com/security/cve/CVE-2019-2539\nhttps://access.redhat.com/security/cve/CVE-2019-2580\nhttps://access.redhat.com/security/cve/CVE-2019-2581\nhttps://access.redhat.com/security/cve/CVE-2019-2584\nhttps://access.redhat.com/security/cve/CVE-2019-2585\nhttps://access.redhat.com/security/cve/CVE-2019-2587\nhttps://access.redhat.com/security/cve/CVE-2019-2589\nhttps://access.redhat.com/security/cve/CVE-2019-2592\nhttps://access.redhat.com/security/cve/CVE-2019-2593\nhttps://access.redhat.com/security/cve/CVE-2019-2596\nhttps://access.redhat.com/security/cve/CVE-2019-2606\nhttps://access.redhat.com/security/cve/CVE-2019-2607\nhttps://access.redhat.com/security/cve/CVE-2019-2614\nhttps://access.redhat.com/security/cve/CVE-2019-2617\nhttps://access.redhat.com/security/cve/CVE-2019-2620\nhttps://access.redhat.com/security/cve/CVE-2019-2623\nhttps://access.redhat.com/security/cve/CVE-2019-2624\nhttps://access.redhat.com/security/cve/CVE-2019-2625\nhttps://access.redhat.com/security/cve/CVE-2019-2626\nhttps://access.redhat.com/security/cve/CVE-2019-2627\nhttps://access.redhat.com/security/cve/CVE-2019-2628\nhttps://access.redhat.com/security/cve/CVE-2019-2630\nhttps://access.redhat.com/security/cve/CVE-2019-2631\nhttps://access.redhat.com/security/cve/CVE-2019-2634\nhttps://access.redhat.com/security/cve/CVE-2019-2635\nhttps://access.redhat.com/security/cve/CVE-2019-2636\nhttps://access.redhat.com/security/cve/CVE-2019-2644\nhttps://access.redhat.com/security/cve/CVE-2019-2681\nhttps://access.redhat.com/security/cve/CVE-2019-2683\nhttps://access.redhat.com/security/cve/CVE-2019-2685\nhttps://access.redhat.com/security/cve/CVE-2019-2686\nhttps://access.redhat.com/security/cve/CVE-2019-2687\nhttps://access.redhat.com/security/cve/CVE-2019-2688\nhttps://access.redhat.com/security/cve/CVE-2019-2689\nhttps://access.redhat.com/security/cve/CVE-2019-2691\nhttps://access.redhat.com/security/cve/CVE-2019-2693\nhttps://access.redhat.com/security/cve/CVE-2019-2694\nhttps://access.redhat.com/security/cve/CVE-2019-2695\nhttps://access.redhat.com/security/cve/CVE-2019-2737\nhttps://access.redhat.com/security/cve/CVE-2019-2738\nhttps://access.redhat.com/security/cve/CVE-2019-2739\nhttps://access.redhat.com/security/cve/CVE-2019-2740\nhttps://access.redhat.com/security/cve/CVE-2019-2752\nhttps://access.redhat.com/security/cve/CVE-2019-2755\nhttps://access.redhat.com/security/cve/CVE-2019-2757\nhttps://access.redhat.com/security/cve/CVE-2019-2758\nhttps://access.redhat.com/security/cve/CVE-2019-2774\nhttps://access.redhat.com/security/cve/CVE-2019-2778\nhttps://access.redhat.com/security/cve/CVE-2019-2780\nhttps://access.redhat.com/security/cve/CVE-2019-2784\nhttps://access.redhat.com/security/cve/CVE-2019-2785\nhttps://access.redhat.com/security/cve/CVE-2019-2789\nhttps://access.redhat.com/security/cve/CVE-2019-2795\nhttps://access.redhat.com/security/cve/CVE-2019-2796\nhttps://access.redhat.com/security/cve/CVE-2019-2797\nhttps://access.redhat.com/security/cve/CVE-2019-2798\nhttps://access.redhat.com/security/cve/CVE-2019-2800\nhttps://access.redhat.com/security/cve/CVE-2019-2801\nhttps://access.redhat.com/security/cve/CVE-2019-2802\nhttps://access.redhat.com/security/cve/CVE-2019-2803\nhttps://access.redhat.com/security/cve/CVE-2019-2805\nhttps://access.redhat.com/security/cve/CVE-2019-2808\nhttps://access.redhat.com/security/cve/CVE-2019-2810\nhttps://access.redhat.com/security/cve/CVE-2019-2811\nhttps://access.redhat.com/security/cve/CVE-2019-2812\nhttps://access.redhat.com/security/cve/CVE-2019-2814\nhttps://access.redhat.com/security/cve/CVE-2019-2815\nhttps://access.redhat.com/security/cve/CVE-2019-2819\nhttps://access.redhat.com/security/cve/CVE-2019-2826\nhttps://access.redhat.com/security/cve/CVE-2019-2830\nhttps://access.redhat.com/security/cve/CVE-2019-2834\nhttps://access.redhat.com/security/cve/CVE-2019-2879\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nzLIpZwaofO8=\n=dahN\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2686"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "db": "BID",
        "id": "107913"
      },
      {
        "db": "PACKETSTORM",
        "id": "154103"
      },
      {
        "db": "PACKETSTORM",
        "id": "154060"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-2686",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "107913",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.3142",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "154103",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "154060",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "db": "BID",
        "id": "107913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "db": "PACKETSTORM",
        "id": "154103"
      },
      {
        "db": "PACKETSTORM",
        "id": "154060"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2686"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ]
  },
  "id": "VAR-201904-0029",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      }
    ]
  },
  "last_update_date": "2023-12-18T11:00:09.247000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Oracle Critical Patch Update Advisory - April 2019",
        "trust": 0.8,
        "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
      },
      {
        "title": "Text Form of Oracle Critical Patch Update - April 2019 Risk Matrices",
        "trust": 0.8,
        "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019verbose-5072824.html"
      },
      {
        "title": "Patch for Oracle MySQL Server Denial of Service Vulnerability (CNVD-2019-11756)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/159291"
      },
      {
        "title": "Oracle MySQL Server Fixes for component security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=91472"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-20",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2686"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
      },
      {
        "trust": 2.3,
        "url": "https://access.redhat.com/errata/rhsa-2019:2511"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2019:2484"
      },
      {
        "trust": 1.6,
        "url": "https://support.f5.com/csp/article/k28312671"
      },
      {
        "trust": 1.2,
        "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019verbose-5072824.html"
      },
      {
        "trust": 0.9,
        "url": "http://www.oracle.com/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2686"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2686"
      },
      {
        "trust": 0.6,
        "url": "https://www.securityfocus.com/bid/107913"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.3142/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/oracle-mysql-vulnerabilities-of-april-2019-29050"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-is-potentially-impacted-by-vulnerabilities-in-mysql/"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2581"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2533"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2830"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2686"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2635"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2785"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2507"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2539"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2530"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2537"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2536"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2688"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2503"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2620"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2631"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2539"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2752"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2607"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2826"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2627"
      },
      {
        "trust": 0.2,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2495"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2528"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2528"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2614"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2757"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2801"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2758"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2529"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2797"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2798"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2587"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2482"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2503"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2510"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2534"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2532"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2628"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2695"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2803"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2481"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2800"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2581"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2584"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2805"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2537"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2737"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2811"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2592"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2815"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2683"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2420"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2593"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2530"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2623"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2481"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2436"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2624"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2486"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2495"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2739"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2494"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2494"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2625"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2644"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2810"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2834"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2534"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2689"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2617"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2585"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2755"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2694"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2819"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2529"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2740"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2796"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2691"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2585"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2626"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2738"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2584"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2580"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2486"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2802"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2535"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2681"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2502"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2531"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2420"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2455"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2774"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2535"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2808"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2455"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2630"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2502"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2434"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2533"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2778"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2685"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2634"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2532"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2510"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2789"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2507"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2531"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2536"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2784"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2636"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2879"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2589"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2482"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2596"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2434"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2795"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2814"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2812"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2606"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2436"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2687"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2580"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2693"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2780"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/key/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "db": "BID",
        "id": "107913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "db": "PACKETSTORM",
        "id": "154103"
      },
      {
        "db": "PACKETSTORM",
        "id": "154060"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2686"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "db": "BID",
        "id": "107913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "db": "PACKETSTORM",
        "id": "154103"
      },
      {
        "db": "PACKETSTORM",
        "id": "154060"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2686"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-04-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "date": "2019-04-16T00:00:00",
        "db": "BID",
        "id": "107913"
      },
      {
        "date": "2019-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "date": "2019-08-15T22:30:31",
        "db": "PACKETSTORM",
        "id": "154103"
      },
      {
        "date": "2019-08-14T23:03:33",
        "db": "PACKETSTORM",
        "id": "154060"
      },
      {
        "date": "2019-04-23T19:32:55.553000",
        "db": "NVD",
        "id": "CVE-2019-2686"
      },
      {
        "date": "2019-04-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-04-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-11756"
      },
      {
        "date": "2019-04-16T00:00:00",
        "db": "BID",
        "id": "107913"
      },
      {
        "date": "2019-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      },
      {
        "date": "2023-01-30T15:46:55.587000",
        "db": "NVD",
        "id": "CVE-2019-2686"
      },
      {
        "date": "2023-02-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Oracle MySQL of  MySQL Server In  Server: Optimizer Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003631"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201904-674"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.