Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mysql
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mysql
ID: RHSA-2025:1671
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux AppStream (v. 9), Red Hat CodeReady Linux Builder (v. 9)
Datum: Mi, 19. Februar 2025, 23:33
Referenzen: https://access.redhat.com/security/cve/CVE-2024-21193
https://access.redhat.com/security/cve/CVE-2024-7264
https://access.redhat.com/security/cve/CVE-2024-21238
https://access.redhat.com/security/cve/CVE-2024-21198
https://bugzilla.redhat.com/show_bug.cgi?id=2301888
https://bugzilla.redhat.com/show_bug.cgi?id=2318873
https://bugzilla.redhat.com/show_bug.cgi?id=2339275
https://bugzilla.redhat.com/show_bug.cgi?id=2318900
https://bugzilla.redhat.com/show_bug.cgi?id=2318926
https://bugzilla.redhat.com/show_bug.cgi?id=2339284
https://access.redhat.com/security/cve/CVE-2025-21536
https://bugzilla.redhat.com/show_bug.cgi?id=2339281
https://access.redhat.com/security/cve/CVE-2024-21203
https://bugzilla.redhat.com/show_bug.cgi?id=2339221
https://access.redhat.com/security/cve/CVE-2025-21534
https://bugzilla.redhat.com/show_bug.cgi?id=2339252
https://bugzilla.redhat.com/show_bug.cgi?id=2318885
https://bugzilla.redhat.com/show_bug.cgi?id=2318927
https://bugzilla.redhat.com/show_bug.cgi?id=2339295
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://access.redhat.com/security/cve/CVE-2024-21213
https://bugzilla.redhat.com/show_bug.cgi?id=2339247
https://access.redhat.com/security/cve/CVE-2024-21237
https://access.redhat.com/security/cve/CVE-2024-5535
https://issues.redhat.com/browse/RHEL-40867
https://access.redhat.com/security/cve/CVE-2024-21197
https://bugzilla.redhat.com/show_bug.cgi?id=2318858
https://bugzilla.redhat.com/show_bug.cgi?id=2339305
https://access.redhat.com/security/cve/CVE-2024-21212
https://bugzilla.redhat.com/show_bug.cgi?id=2318886
https://bugzilla.redhat.com/show_bug.cgi?id=2318876
https://bugzilla.redhat.com/show_bug.cgi?id=2339293
https://bugzilla.redhat.com/show_bug.cgi?id=2339220
https://access.redhat.com/security/cve/CVE-2024-11053
https://access.redhat.com/security/cve/CVE-2025-21505
https://access.redhat.com/security/cve/CVE-2024-21231
https://bugzilla.redhat.com/show_bug.cgi?id=2318905
https://access.redhat.com/security/cve/CVE-2024-21199
https://bugzilla.redhat.com/show_bug.cgi?id=2339259
https://access.redhat.com/security/cve/CVE-2024-21218
https://bugzilla.redhat.com/show_bug.cgi?id=2339300
https://bugzilla.redhat.com/show_bug.cgi?id=2339226
https://access.redhat.com/security/cve/CVE-2025-21518
https://access.redhat.com/security/cve/CVE-2024-21236
https://access.redhat.com/security/cve/CVE-2024-21201
https://bugzilla.redhat.com/show_bug.cgi?id=2318884
https://access.redhat.com/security/cve/CVE-2025-21559
https://bugzilla.redhat.com/show_bug.cgi?id=2294581
https://bugzilla.redhat.com/show_bug.cgi?id=2318870
https://bugzilla.redhat.com/show_bug.cgi?id=2339270
https://bugzilla.redhat.com/show_bug.cgi?id=2318923
https://bugzilla.redhat.com/show_bug.cgi?id=2318857
https://bugzilla.redhat.com/show_bug.cgi?id=2339266
https://access.redhat.com/security/cve/CVE-2025-21540
https://bugzilla.redhat.com/show_bug.cgi?id=2339271
https://access.redhat.com/security/cve/CVE-2024-21241
https://bugzilla.redhat.com/show_bug.cgi?id=2339238
https://bugzilla.redhat.com/show_bug.cgi?id=2318883
https://bugzilla.redhat.com/show_bug.cgi?id=2339299
https://access.redhat.com/security/cve/CVE-2025-21521
https://access.redhat.com/security/cve/CVE-2025-21525
https://access.redhat.com/security/cve/CVE-2025-21503
https://access.redhat.com/security/cve/CVE-2025-21490
https://access.redhat.com/security/cve/CVE-2024-21194
https://bugzilla.redhat.com/show_bug.cgi?id=2339304
https://access.redhat.com/security/cve/CVE-2024-21196
https://access.redhat.com/security/cve/CVE-2025-21522
https://bugzilla.redhat.com/show_bug.cgi?id=2339277
https://access.redhat.com/security/cve/CVE-2024-37371
https://access.redhat.com/security/cve/CVE-2025-21491
https://access.redhat.com/security/cve/CVE-2025-21500
https://bugzilla.redhat.com/show_bug.cgi?id=2318925
https://access.redhat.com/security/cve/CVE-2025-21543
https://bugzilla.redhat.com/show_bug.cgi?id=2318882
https://bugzilla.redhat.com/show_bug.cgi?id=2339231
https://access.redhat.com/security/cve/CVE-2025-21531
https://access.redhat.com/errata/RHSA-2025:1671
https://access.redhat.com/security/cve/CVE-2025-21523
https://access.redhat.com/security/cve/CVE-2025-21520
https://bugzilla.redhat.com/show_bug.cgi?id=2339243
https://access.redhat.com/security/cve/CVE-2024-21230
https://access.redhat.com/security/cve/CVE-2025-21497
https://access.redhat.com/security/cve/CVE-2025-21504
https://bugzilla.redhat.com/show_bug.cgi?id=2339236
https://access.redhat.com/security/cve/CVE-2025-21555
https://bugzilla.redhat.com/show_bug.cgi?id=2318914
https://access.redhat.com/security/cve/CVE-2024-21239
https://bugzilla.redhat.com/show_bug.cgi?id=2318922
https://bugzilla.redhat.com/show_bug.cgi?id=2339218
https://bugzilla.redhat.com/show_bug.cgi?id=2318874
https://access.redhat.com/security/cve/CVE-2025-21546
https://access.redhat.com/security/cve/CVE-2025-21529
https://access.redhat.com/security/cve/CVE-2025-21501
https://issues.redhat.com/browse/RHEL-5470
https://access.redhat.com/security/cve/CVE-2024-21247
https://access.redhat.com/security/cve/CVE-2025-21519
https://access.redhat.com/security/cve/CVE-2024-21219
https://access.redhat.com/security/cve/CVE-2025-21494
https://bugzilla.redhat.com/show_bug.cgi?id=2331191
https://bugzilla.redhat.com/show_bug.cgi?id=2339291
https://bugzilla.redhat.com/show_bug.cgi?id=2318897
Applikationen: MySQL

Originalnachricht

An update for mysql is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

MySQL is a multi-user, multi-threaded SQL database server. It consists of the
MySQL server daemon (mysqld) and many client programs and libraries.

Security Fix(es):

* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)

* krb5: GSS message token handling (CVE-2024-37371)

* curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)

* mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)
(CVE-2024-21238)

* mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)

* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)

* mysql: Client programs unspecified vulnerability (CPU Oct 2024)
(CVE-2024-21231)

* mysql: Information Schema unspecified vulnerability (CPU Oct 2024)
(CVE-2024-21197)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)

* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)

* mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)
(CVE-2024-21237)

* mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)

* mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)
(CVE-2024-21212)

* mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)

* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)

* mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)

* mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)

* mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)

* curl: curl netrc password leak (CVE-2024-11053)

* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)

* mysql: MySQL Server Options Vulnerability (CVE-2025-21520)

* mysql: High Privilege Denial of Service Vulnerability in MySQL Server
(CVE-2025-21490)

* mysql: Information Schema unspecified vulnerability (CPU Jan 2025)
(CVE-2025-21529)

* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)

* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)

* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)

* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data
Modification Vulnerability (CVE-2025-21555)

* mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)

* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data
Modification Vulnerability (CVE-2025-21491)

* mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)

* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)

* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)
(CVE-2025-21521)

* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)

* mysql: Performance Schema unspecified vulnerability (CPU Jan 2025)
(CVE-2025-21534)

* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)

* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)

* mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)

* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)

* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)

* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data
Modification Vulnerability (CVE-2025-21559)

* mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)

* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)

* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)

* mysql: Components Services unspecified vulnerability (CPU Jan 2025)
(CVE-2025-21505)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2024-5535: Exposure of Sensitive Information to an Unauthorized Actor
(CWE-200)
CVE-2024-7264: Out-of-bounds Read (CWE-125)
CVE-2024-11053: Exposure of Sensitive Information to an Unauthorized Actor
(CWE-200)
CVE-2024-21193
CVE-2024-21194
CVE-2024-21196
CVE-2024-21197
CVE-2024-21198
CVE-2024-21199
CVE-2024-21201
CVE-2024-21203
CVE-2024-21212
CVE-2024-21213
CVE-2024-21218
CVE-2024-21219
CVE-2024-21230
CVE-2024-21231
CVE-2024-21236
CVE-2024-21237
CVE-2024-21238
CVE-2024-21239
CVE-2024-21241
CVE-2024-21247
CVE-2024-37371
CVE-2025-21490: Improper Resource Shutdown or Release (CWE-404)
CVE-2025-21491: Improper Resource Shutdown or Release (CWE-404)
CVE-2025-21494
CVE-2025-21497
CVE-2025-21500
CVE-2025-21501
CVE-2025-21503
CVE-2025-21504
CVE-2025-21505
CVE-2025-21518
CVE-2025-21519
CVE-2025-21520: Improper Authorization (CWE-285)
CVE-2025-21521
CVE-2025-21522
CVE-2025-21523
CVE-2025-21525
CVE-2025-21529
CVE-2025-21531
CVE-2025-21534
CVE-2025-21536
CVE-2025-21540
CVE-2025-21543
CVE-2025-21546: Improper Privilege Management (CWE-269)
CVE-2025-21555: Improper Resource Shutdown or Release (CWE-404)
CVE-2025-21559: Improper Resource Shutdown or Release (CWE-404)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung