First published: Wed Feb 19 2025(Updated: )
Important: mysql security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mysql | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-common | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-debugsource | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-devel-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-errmsg | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-libs-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-server | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-server-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-test-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-common | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-debugsource | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-devel-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-errmsg | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-libs-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-server | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-server-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-test-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-common | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-debugsource | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-devel-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-errmsg | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-libs-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-server | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-server-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-test-debuginfo | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-common | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-debuginfo | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-debugsource | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-devel-debuginfo | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-errmsg | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-libs-debuginfo | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-server | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-server-debuginfo | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-test-debuginfo | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-devel | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-libs | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-test | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-devel | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-libs | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-test | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-devel | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-libs | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-test | <8.0.41-2.el9_5.aa | 8.0.41-2.el9_5.aa |
redhat/mysql-devel | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-libs | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
redhat/mysql-test | <8.0.41-2.el9_5 | 8.0.41-2.el9_5 |
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat CodeReady Linux Builder for ARM 64 | ||
Red Hat CodeReady Linux Builder for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1671 is classified as Important.
To fix RHSA-2025:1671, update MySQL to version 8.0.41-2.el9_5 or later.
Versions of MySQL prior to 8.0.41-2.el9_5 are affected by RHSA-2025:1671.
RHSA-2025:1671 addresses an SSL_select_next_proto buffer overread vulnerability, identified as CVE-2024-5535.
Yes, RHSA-2025:1671 affects both MySQL server and associated client programs.