- Issued:
- 2022-09-20
- Updated:
- 2022-09-20
RHSA-2022:6590 - Moderate: mysql security, bug fix, and enhancement update
Synopsis
Moderate: mysql security, bug fix, and enhancement update
Type/Severity
Security Advisory Moderate
Topic
An update for mysql is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)
Security Fix(es):
-
mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)
-
mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)
-
mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)
-
mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)
-
mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)
-
mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
-
mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)
-
mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)
-
mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)
-
mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)
-
mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)
-
mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)
-
mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)
-
mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)
-
mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)
-
mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Default logrotate set to wrong log file (BZ#2122592)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 | 9 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.0 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.0 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.2 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian | 9 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.4 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.2 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.0 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.4 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.2 | ppc64le |
| Red Hat Enterprise Linux for IBM z Systems | 9 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.2 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.0 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.2 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.2 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.0 | s390x |
| Red Hat Enterprise Linux for ARM 64 | 9 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.2 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.0 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.2 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.2 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.0 | aarch64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.6 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.4 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.2 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.0 | ppc64le |
| Red Hat Enterprise Linux Server - AUS | 9.6 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 9.4 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 9.2 | x86_64 |
| Red Hat CodeReady Linux Builder for x86_64 | 9 | x86_64 |
| Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | 9.6 | x86_64 |
| Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | 9.4 | x86_64 |
| Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | 9.2 | x86_64 |
| Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | 9.0 | x86_64 |
| Red Hat CodeReady Linux Builder for Power, little endian | 9 | ppc64le |
| Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support | 9.6 | ppc64le |
| Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support | 9.4 | ppc64le |
| Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support | 9.2 | ppc64le |
| Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support | 9.0 | ppc64le |
| Red Hat CodeReady Linux Builder for IBM z Systems | 9 | s390x |
| Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support | 9.6 | s390x |
| Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support | 9.4 | s390x |
| Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support | 9.2 | s390x |
| Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support | 9.0 | s390x |
| Red Hat CodeReady Linux Builder for ARM 64 | 9 | aarch64 |
| Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | 9.6 | aarch64 |
| Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | 9.4 | aarch64 |
| Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | 9.2 | aarch64 |
| Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | 9.0 | aarch64 |
Updated Packages
- mysql-libs-debuginfo-8.0.30-3.el9_0.ppc64le.rpm
- mysql-libs-debuginfo-8.0.30-3.el9_0.s390x.rpm
- mysql-server-8.0.30-3.el9_0.aarch64.rpm
- mysql-test-8.0.30-3.el9_0.aarch64.rpm
- mysql-test-debuginfo-8.0.30-3.el9_0.ppc64le.rpm
- mysql-devel-debuginfo-8.0.30-3.el9_0.s390x.rpm
- mysql-test-8.0.30-3.el9_0.x86_64.rpm
- mysql-libs-debuginfo-8.0.30-3.el9_0.x86_64.rpm
- mysql-test-debuginfo-8.0.30-3.el9_0.s390x.rpm
- mysql-test-debuginfo-8.0.30-3.el9_0.aarch64.rpm
- mysql-common-8.0.30-3.el9_0.ppc64le.rpm
- mysql-debuginfo-8.0.30-3.el9_0.ppc64le.rpm
- mysql-debugsource-8.0.30-3.el9_0.aarch64.rpm
- mysql-debuginfo-8.0.30-3.el9_0.aarch64.rpm
- mysql-devel-8.0.30-3.el9_0.x86_64.rpm
- mysql-libs-8.0.30-3.el9_0.aarch64.rpm
- mysql-server-8.0.30-3.el9_0.x86_64.rpm
- mysql-server-debuginfo-8.0.30-3.el9_0.ppc64le.rpm
- mysql-server-debuginfo-8.0.30-3.el9_0.x86_64.rpm
- mysql-devel-8.0.30-3.el9_0.ppc64le.rpm
- mysql-debugsource-8.0.30-3.el9_0.ppc64le.rpm
- mysql-test-8.0.30-3.el9_0.ppc64le.rpm
- mysql-debuginfo-8.0.30-3.el9_0.x86_64.rpm
- mysql-errmsg-8.0.30-3.el9_0.aarch64.rpm
- mysql-debugsource-8.0.30-3.el9_0.s390x.rpm
- mysql-libs-debuginfo-8.0.30-3.el9_0.aarch64.rpm
- mysql-server-debuginfo-8.0.30-3.el9_0.aarch64.rpm
- mysql-server-8.0.30-3.el9_0.ppc64le.rpm
- mysql-libs-8.0.30-3.el9_0.ppc64le.rpm
- mysql-server-8.0.30-3.el9_0.s390x.rpm
- mysql-server-debuginfo-8.0.30-3.el9_0.s390x.rpm
- mysql-test-debuginfo-8.0.30-3.el9_0.x86_64.rpm
- mysql-libs-8.0.30-3.el9_0.x86_64.rpm
- mysql-common-8.0.30-3.el9_0.aarch64.rpm
- mysql-debuginfo-8.0.30-3.el9_0.s390x.rpm
- mysql-common-8.0.30-3.el9_0.s390x.rpm
- mysql-debugsource-8.0.30-3.el9_0.x86_64.rpm
- mysql-test-8.0.30-3.el9_0.s390x.rpm
- mysql-errmsg-8.0.30-3.el9_0.s390x.rpm
- mysql-8.0.30-3.el9_0.src.rpm
- mysql-common-8.0.30-3.el9_0.x86_64.rpm
- mysql-devel-debuginfo-8.0.30-3.el9_0.aarch64.rpm
- mysql-errmsg-8.0.30-3.el9_0.ppc64le.rpm
- mysql-devel-8.0.30-3.el9_0.s390x.rpm
- mysql-devel-8.0.30-3.el9_0.aarch64.rpm
- mysql-8.0.30-3.el9_0.x86_64.rpm
- mysql-8.0.30-3.el9_0.ppc64le.rpm
- mysql-8.0.30-3.el9_0.s390x.rpm
- mysql-devel-debuginfo-8.0.30-3.el9_0.x86_64.rpm
- mysql-8.0.30-3.el9_0.aarch64.rpm
- mysql-devel-debuginfo-8.0.30-3.el9_0.ppc64le.rpm
- mysql-errmsg-8.0.30-3.el9_0.x86_64.rpm
- mysql-libs-8.0.30-3.el9_0.s390x.rpm
Fixes
- This content is not included.BZ - 2082636
- This content is not included.BZ - 2082637
- This content is not included.BZ - 2082638
- This content is not included.BZ - 2082639
- This content is not included.BZ - 2082640
- This content is not included.BZ - 2082641
- This content is not included.BZ - 2082642
- This content is not included.BZ - 2082643
- This content is not included.BZ - 2082644
- This content is not included.BZ - 2082645
- This content is not included.BZ - 2082646
- This content is not included.BZ - 2082647
- This content is not included.BZ - 2082648
- This content is not included.BZ - 2082649
- This content is not included.BZ - 2082650
- This content is not included.BZ - 2082651
- This content is not included.BZ - 2082652
- This content is not included.BZ - 2082653
- This content is not included.BZ - 2082654
- This content is not included.BZ - 2082655
- This content is not included.BZ - 2082656
- This content is not included.BZ - 2082657
- This content is not included.BZ - 2082658
- This content is not included.BZ - 2082659
- This content is not included.BZ - 2115282
- This content is not included.BZ - 2115283
- This content is not included.BZ - 2115284
- This content is not included.BZ - 2115285
- This content is not included.BZ - 2115286
- This content is not included.BZ - 2115287
- This content is not included.BZ - 2115288
- This content is not included.BZ - 2115289
- This content is not included.BZ - 2115290
- This content is not included.BZ - 2115291
- This content is not included.BZ - 2115292
- This content is not included.BZ - 2115293
- This content is not included.BZ - 2115294
- This content is not included.BZ - 2115295
- This content is not included.BZ - 2115296
- This content is not included.BZ - 2115297
- This content is not included.BZ - 2115298
- This content is not included.BZ - 2115299
- This content is not included.BZ - 2115300
- This content is not included.BZ - 2115301
- This content is not included.BZ - 2122589
- This content is not included.BZ - 2122592
CVEs
- CVE-2022-21412
- CVE-2022-21413
- CVE-2022-21414
- CVE-2022-21415
- CVE-2022-21417
- CVE-2022-21418
- CVE-2022-21423
- CVE-2022-21425
- CVE-2022-21427
- CVE-2022-21435
- CVE-2022-21436
- CVE-2022-21437
- CVE-2022-21438
- CVE-2022-21440
- CVE-2022-21444
- CVE-2022-21451
- CVE-2022-21452
- CVE-2022-21454
- CVE-2022-21455
- CVE-2022-21457
- CVE-2022-21459
- CVE-2022-21460
- CVE-2022-21462
- CVE-2022-21478
- CVE-2022-21479
- CVE-2022-21509
- CVE-2022-21515
- CVE-2022-21517
- CVE-2022-21522
- CVE-2022-21525
- CVE-2022-21526
- CVE-2022-21527
- CVE-2022-21528
- CVE-2022-21529
- CVE-2022-21530
- CVE-2022-21531
- CVE-2022-21534
- CVE-2022-21537
- CVE-2022-21538
- CVE-2022-21539
- CVE-2022-21547
- CVE-2022-21553
- CVE-2022-21556
- CVE-2022-21569
- CVE-2022-21592
- CVE-2022-21605
- CVE-2022-21607
- CVE-2022-21635
- CVE-2022-21638
- CVE-2022-21641
- CVE-2023-21866
- CVE-2023-21872
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.