alsa-2025:1671
Vulnerability from osv_almalinux
Published
2025-02-19 00:00
Modified
2025-02-20 14:55
Summary
Important: mysql security update
Details

MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

Security Fix(es):

  • openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
  • krb5: GSS message token handling (CVE-2024-37371)
  • curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)
  • mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)
  • mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)
  • mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)
  • mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)
  • mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)
  • mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)
  • mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)
  • mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)
  • mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)
  • mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)
  • mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)
  • mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)
  • mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)
  • mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)
  • mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)
  • mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)
  • mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)
  • mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)
  • mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)
  • mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)
  • curl: curl netrc password leak (CVE-2024-11053)
  • mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)
  • mysql: MySQL Server Options Vulnerability (CVE-2025-21520)
  • mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
  • mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)
  • mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)
  • mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)
  • mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)
  • mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)
  • mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)
  • mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)
  • mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)
  • mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)
  • mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)
  • mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)
  • mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)
  • mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)
  • mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)
  • mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)
  • mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)
  • mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)
  • mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)
  • mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)
  • mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)
  • mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)
  • mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
https://access.redhat.com/errata/RHSA-2025:1671 ADVISORY
https://access.redhat.com/security/cve/CVE-2024-11053 REPORT
https://access.redhat.com/security/cve/CVE-2024-21193 REPORT
https://access.redhat.com/security/cve/CVE-2024-21194 REPORT
https://access.redhat.com/security/cve/CVE-2024-21196 REPORT
https://access.redhat.com/security/cve/CVE-2024-21197 REPORT
https://access.redhat.com/security/cve/CVE-2024-21198 REPORT
https://access.redhat.com/security/cve/CVE-2024-21199 REPORT
https://access.redhat.com/security/cve/CVE-2024-21201 REPORT
https://access.redhat.com/security/cve/CVE-2024-21203 REPORT
https://access.redhat.com/security/cve/CVE-2024-21212 REPORT
https://access.redhat.com/security/cve/CVE-2024-21213 REPORT
https://access.redhat.com/security/cve/CVE-2024-21218 REPORT
https://access.redhat.com/security/cve/CVE-2024-21219 REPORT
https://access.redhat.com/security/cve/CVE-2024-21230 REPORT
https://access.redhat.com/security/cve/CVE-2024-21231 REPORT
https://access.redhat.com/security/cve/CVE-2024-21236 REPORT
https://access.redhat.com/security/cve/CVE-2024-21237 REPORT
https://access.redhat.com/security/cve/CVE-2024-21238 REPORT
https://access.redhat.com/security/cve/CVE-2024-21239 REPORT
https://access.redhat.com/security/cve/CVE-2024-21241 REPORT
https://access.redhat.com/security/cve/CVE-2024-21247 REPORT
https://access.redhat.com/security/cve/CVE-2024-37371 REPORT
https://access.redhat.com/security/cve/CVE-2024-5535 REPORT
https://access.redhat.com/security/cve/CVE-2024-7264 REPORT
https://access.redhat.com/security/cve/CVE-2025-21490 REPORT
https://access.redhat.com/security/cve/CVE-2025-21491 REPORT
https://access.redhat.com/security/cve/CVE-2025-21494 REPORT
https://access.redhat.com/security/cve/CVE-2025-21497 REPORT
https://access.redhat.com/security/cve/CVE-2025-21500 REPORT
https://access.redhat.com/security/cve/CVE-2025-21501 REPORT
https://access.redhat.com/security/cve/CVE-2025-21503 REPORT
https://access.redhat.com/security/cve/CVE-2025-21504 REPORT
https://access.redhat.com/security/cve/CVE-2025-21505 REPORT
https://access.redhat.com/security/cve/CVE-2025-21518 REPORT
https://access.redhat.com/security/cve/CVE-2025-21519 REPORT
https://access.redhat.com/security/cve/CVE-2025-21520 REPORT
https://access.redhat.com/security/cve/CVE-2025-21521 REPORT
https://access.redhat.com/security/cve/CVE-2025-21522 REPORT
https://access.redhat.com/security/cve/CVE-2025-21523 REPORT
https://access.redhat.com/security/cve/CVE-2025-21525 REPORT
https://access.redhat.com/security/cve/CVE-2025-21529 REPORT
https://access.redhat.com/security/cve/CVE-2025-21531 REPORT
https://access.redhat.com/security/cve/CVE-2025-21534 REPORT
https://access.redhat.com/security/cve/CVE-2025-21536 REPORT
https://access.redhat.com/security/cve/CVE-2025-21540 REPORT
https://access.redhat.com/security/cve/CVE-2025-21543 REPORT
https://access.redhat.com/security/cve/CVE-2025-21546 REPORT
https://access.redhat.com/security/cve/CVE-2025-21555 REPORT
https://access.redhat.com/security/cve/CVE-2025-21559 REPORT
https://bugzilla.redhat.com/2294581 REPORT
https://bugzilla.redhat.com/2294676 REPORT
https://bugzilla.redhat.com/2301888 REPORT
https://bugzilla.redhat.com/2318857 REPORT
https://bugzilla.redhat.com/2318858 REPORT
https://bugzilla.redhat.com/2318870 REPORT
https://bugzilla.redhat.com/2318873 REPORT
https://bugzilla.redhat.com/2318874 REPORT
https://bugzilla.redhat.com/2318876 REPORT
https://bugzilla.redhat.com/2318882 REPORT
https://bugzilla.redhat.com/2318883 REPORT
https://bugzilla.redhat.com/2318884 REPORT
https://bugzilla.redhat.com/2318885 REPORT
https://bugzilla.redhat.com/2318886 REPORT
https://bugzilla.redhat.com/2318897 REPORT
https://bugzilla.redhat.com/2318900 REPORT
https://bugzilla.redhat.com/2318905 REPORT
https://bugzilla.redhat.com/2318914 REPORT
https://bugzilla.redhat.com/2318922 REPORT
https://bugzilla.redhat.com/2318923 REPORT
https://bugzilla.redhat.com/2318925 REPORT
https://bugzilla.redhat.com/2318926 REPORT
https://bugzilla.redhat.com/2318927 REPORT
https://bugzilla.redhat.com/2331191 REPORT
https://bugzilla.redhat.com/2339218 REPORT
https://bugzilla.redhat.com/2339220 REPORT
https://bugzilla.redhat.com/2339221 REPORT
https://bugzilla.redhat.com/2339226 REPORT
https://bugzilla.redhat.com/2339231 REPORT
https://bugzilla.redhat.com/2339236 REPORT
https://bugzilla.redhat.com/2339238 REPORT
https://bugzilla.redhat.com/2339243 REPORT
https://bugzilla.redhat.com/2339247 REPORT
https://bugzilla.redhat.com/2339252 REPORT
https://bugzilla.redhat.com/2339259 REPORT
https://bugzilla.redhat.com/2339266 REPORT
https://bugzilla.redhat.com/2339270 REPORT
https://bugzilla.redhat.com/2339271 REPORT
https://bugzilla.redhat.com/2339275 REPORT
https://bugzilla.redhat.com/2339277 REPORT
https://bugzilla.redhat.com/2339281 REPORT
https://bugzilla.redhat.com/2339284 REPORT
https://bugzilla.redhat.com/2339291 REPORT
https://bugzilla.redhat.com/2339293 REPORT
https://bugzilla.redhat.com/2339295 REPORT
https://bugzilla.redhat.com/2339299 REPORT
https://bugzilla.redhat.com/2339300 REPORT
https://bugzilla.redhat.com/2339304 REPORT
https://bugzilla.redhat.com/2339305 REPORT
https://errata.almalinux.org/9/ALSA-2025-1671.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.41-2.el9_5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-common"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.41-2.el9_5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.41-2.el9_5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-errmsg"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.41-2.el9_5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.41-2.el9_5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-server"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.41-2.el9_5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "mysql-test"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.0.41-2.el9_5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.  \n\nSecurity Fix(es):  \n\n  * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n  * krb5: GSS message token handling (CVE-2024-37371)\n  * curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n  * mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n  * mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n  * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n  * mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n  * mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n  * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n  * mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n  * mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n  * mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n  * mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n  * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n  * mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n  * mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n  * mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n  * curl: curl netrc password leak (CVE-2024-11053)\n  * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n  * mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n  * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n  * mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n  * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n  * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n  * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n  * mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n  * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n  * mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n  * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n  * mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n  * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n  * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n  * mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n  * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n  * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n  * mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n  * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n  * mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
  "id": "ALSA-2025:1671",
  "modified": "2025-02-20T14:55:32Z",
  "published": "2025-02-19T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2025:1671"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-11053"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21193"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21194"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21196"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21197"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21198"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21199"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21201"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21203"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21212"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21213"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21218"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21219"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21230"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21231"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21236"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21237"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21238"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21239"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21241"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-21247"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-37371"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-5535"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-7264"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21490"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21491"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21494"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21497"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21500"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21501"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21503"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21504"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21505"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21518"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21519"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21520"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21521"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21522"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21523"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21525"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21529"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21531"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21534"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21536"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21540"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21543"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21546"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21555"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21559"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2294581"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2294676"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2301888"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318857"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318858"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318870"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318873"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318874"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318876"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318882"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318883"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318884"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318885"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318886"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318897"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318900"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318905"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318914"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318922"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318923"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318925"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318926"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2318927"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2331191"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339218"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339220"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339221"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339226"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339231"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339236"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339238"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339243"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339247"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339252"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339259"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339266"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339270"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339271"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339275"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339277"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339281"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339284"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339291"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339293"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339295"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339299"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339300"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339304"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2339305"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/9/ALSA-2025-1671.html"
    }
  ],
  "related": [
    "CVE-2024-5535",
    "CVE-2024-37371",
    "CVE-2024-7264",
    "CVE-2024-21238",
    "CVE-2024-21196",
    "CVE-2024-21241",
    "CVE-2024-21231",
    "CVE-2024-21197",
    "CVE-2024-21218",
    "CVE-2024-21201",
    "CVE-2024-21236",
    "CVE-2024-21237",
    "CVE-2024-21203",
    "CVE-2024-21212",
    "CVE-2024-21219",
    "CVE-2024-21230",
    "CVE-2024-21213",
    "CVE-2024-21194",
    "CVE-2024-21199",
    "CVE-2024-21193",
    "CVE-2024-21198",
    "CVE-2024-21247",
    "CVE-2024-21239",
    "CVE-2024-11053",
    "CVE-2025-21497",
    "CVE-2025-21520",
    "CVE-2025-21490",
    "CVE-2025-21529",
    "CVE-2025-21531",
    "CVE-2025-21504",
    "CVE-2025-21540",
    "CVE-2025-21555",
    "CVE-2025-21543",
    "CVE-2025-21491",
    "CVE-2025-21525",
    "CVE-2025-21536",
    "CVE-2025-21521",
    "CVE-2025-21501",
    "CVE-2025-21534",
    "CVE-2025-21494",
    "CVE-2025-21519",
    "CVE-2025-21522",
    "CVE-2025-21503",
    "CVE-2025-21518",
    "CVE-2025-21559",
    "CVE-2025-21546",
    "CVE-2025-21500",
    "CVE-2025-21523",
    "CVE-2025-21505"
  ],
  "summary": "Important: mysql security update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…