alsa-2025:15699
Vulnerability from osv_almalinux
Published
2025-09-11 00:00
Modified
2025-09-12 10:30
Summary
Moderate: mysql-selinux and mysql8.4 security update
Details

MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files.

Security Fix(es):

  • openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)
  • mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
  • mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
  • mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
  • mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
  • mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
  • mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
  • mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
  • mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
  • mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
  • mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)
  • mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
  • mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
  • mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
  • mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
  • mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
  • mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
  • mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
  • mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
  • mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
  • mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
  • mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
  • mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
  • mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
  • mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
  • mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
  • mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
  • mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
  • curl: libcurl: WebSocket endless loop (CVE-2025-5399)
  • mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
  • mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
  • mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
  • mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
  • mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
  • mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
  • mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
  • mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
  • mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
  • mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
  • mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
  • mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
  • mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
  • mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
  • mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
  • mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.


{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:10",
        "name": "mysql-selinux"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1.0.14-1.el10_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:10",
        "name": "mysql8.4-common"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.4.6-2.el10_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:10",
        "name": "mysql8.4-errmsg"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.4.6-2.el10_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:10",
        "name": "mysql8.4-test-data"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "8.4.6-2.el10_0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files.  \n\nSecurity Fix(es):  \n\n  * openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)\n  * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)\n  * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)\n  * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)\n  * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)\n  * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)\n  * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)\n  * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)\n  * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)\n  * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)\n  * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)\n  * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)\n  * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)\n  * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)\n  * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)\n  * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)\n  * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)\n  * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)\n  * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)\n  * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)\n  * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)\n  * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)\n  * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)\n  * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)\n  * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)\n  * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)\n  * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)\n  * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)\n  * curl: libcurl: WebSocket endless loop (CVE-2025-5399)\n  * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)\n  * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)\n  * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)\n  * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)\n  * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)\n  * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)\n  * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)\n  * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)\n  * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)\n  * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)\n  * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)\n  * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)\n  * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)\n  * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)\n  * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)\n  * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
  "id": "ALSA-2025:15699",
  "modified": "2025-09-12T10:30:08Z",
  "published": "2025-09-11T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2025:15699"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2024-13176"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21574"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21575"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21577"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21579"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21580"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21581"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21584"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21585"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-21588"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30681"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30682"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30683"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30684"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30685"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30687"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30688"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30689"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30693"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30695"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30696"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30699"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30703"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30704"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30705"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30715"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30721"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-30722"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50077"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50078"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50079"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50080"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50081"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50082"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50083"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50084"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50085"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50086"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50087"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50088"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50091"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50092"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50093"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50094"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50096"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50097"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50098"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50099"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50100"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50101"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50102"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-50104"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2025-5399"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359885"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359888"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359892"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359894"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359895"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359899"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359900"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359902"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359903"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359911"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359918"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359920"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359924"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359928"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359930"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359932"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359934"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359938"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359940"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359943"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359944"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359945"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359947"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359950"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359963"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359964"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2359972"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2370920"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380264"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380273"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380274"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380278"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380280"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380283"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380284"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380290"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380291"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380295"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380298"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380306"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380308"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380309"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380310"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380312"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380313"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380320"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380321"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380322"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380326"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380327"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380334"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2380335"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/10/ALSA-2025-15699.html"
    }
  ],
  "related": [
    "CVE-2024-13176",
    "CVE-2025-30722",
    "CVE-2025-30688",
    "CVE-2025-30699",
    "CVE-2025-30721",
    "CVE-2025-30682",
    "CVE-2025-30683",
    "CVE-2025-30715",
    "CVE-2025-21574",
    "CVE-2025-21585",
    "CVE-2025-21588",
    "CVE-2025-30681",
    "CVE-2025-21577",
    "CVE-2025-30687",
    "CVE-2025-21580",
    "CVE-2025-30696",
    "CVE-2025-30705",
    "CVE-2025-21575",
    "CVE-2025-21579",
    "CVE-2025-30685",
    "CVE-2025-30704",
    "CVE-2025-21581",
    "CVE-2025-30689",
    "CVE-2025-30695",
    "CVE-2025-30703",
    "CVE-2025-30693",
    "CVE-2025-21584",
    "CVE-2025-30684",
    "CVE-2025-5399",
    "CVE-2025-50092",
    "CVE-2025-50081",
    "CVE-2025-50079",
    "CVE-2025-50077",
    "CVE-2025-50078",
    "CVE-2025-50091",
    "CVE-2025-50101",
    "CVE-2025-50093",
    "CVE-2025-50099",
    "CVE-2025-50085",
    "CVE-2025-50086",
    "CVE-2025-50082",
    "CVE-2025-50097",
    "CVE-2025-50104",
    "CVE-2025-50087",
    "CVE-2025-50080",
    "CVE-2025-50088",
    "CVE-2025-50083",
    "CVE-2025-50084",
    "CVE-2025-50100",
    "CVE-2025-50094",
    "CVE-2025-50098",
    "CVE-2025-50096",
    "CVE-2025-50102"
  ],
  "summary": "Moderate: mysql-selinux and mysql8.4 security update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…