{"id":"ALSA-2025:1671","summary":"Important: mysql security update","details":"MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.  \n\nSecurity Fix(es):  \n\n  * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n  * krb5: GSS message token handling (CVE-2024-37371)\n  * curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n  * mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n  * mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n  * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n  * mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n  * mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n  * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n  * mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n  * mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n  * mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n  * mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n  * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n  * mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n  * mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n  * mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n  * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n  * curl: curl netrc password leak (CVE-2024-11053)\n  * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n  * mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n  * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n  * mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n  * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n  * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n  * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n  * mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n  * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n  * mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n  * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n  * mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n  * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n  * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n  * mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n  * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n  * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n  * mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n  * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n  * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n  * mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n","modified":"2026-02-04T03:01:39.323669Z","published":"2025-02-19T00:00:00Z","related":["CVE-2024-11053","CVE-2024-21193","CVE-2024-21194","CVE-2024-21196","CVE-2024-21197","CVE-2024-21198","CVE-2024-21199","CVE-2024-21201","CVE-2024-21203","CVE-2024-21212","CVE-2024-21213","CVE-2024-21218","CVE-2024-21219","CVE-2024-21230","CVE-2024-21231","CVE-2024-21236","CVE-2024-21237","CVE-2024-21238","CVE-2024-21239","CVE-2024-21241","CVE-2024-21247","CVE-2024-37371","CVE-2024-5535","CVE-2024-7264","CVE-2025-21490","CVE-2025-21491","CVE-2025-21494","CVE-2025-21497","CVE-2025-21500","CVE-2025-21501","CVE-2025-21503","CVE-2025-21504","CVE-2025-21505","CVE-2025-21518","CVE-2025-21519","CVE-2025-21520","CVE-2025-21521","CVE-2025-21522","CVE-2025-21523","CVE-2025-21525","CVE-2025-21529","CVE-2025-21531","CVE-2025-21534","CVE-2025-21536","CVE-2025-21540","CVE-2025-21543","CVE-2025-21546","CVE-2025-21555","CVE-2025-21559"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-11053"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21193"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21194"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21196"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21197"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21198"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21199"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21201"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21203"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21212"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21213"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21218"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21219"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21230"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21231"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21236"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21237"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21238"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21239"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21241"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21247"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-37371"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-5535"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-7264"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21490"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21491"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21494"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21497"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21500"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21501"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21503"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21504"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21505"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21518"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21519"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21520"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21521"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21522"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21523"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21525"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21529"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21531"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21534"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21536"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21540"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21543"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21546"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21555"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-21559"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2294581"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2294676"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2301888"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318857"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318858"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318870"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318873"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318874"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318876"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318882"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318883"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318884"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318885"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318886"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318897"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318900"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318905"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318914"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318922"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318925"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318926"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2318927"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2331191"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339218"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339220"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339221"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339226"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339231"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339236"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339243"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339252"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339259"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339266"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339271"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339275"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339277"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339281"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339284"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339293"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339295"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339299"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339300"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339304"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2339305"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2025-1671.html"}],"affected":[{"package":{"name":"mysql","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.41-2.el9_5"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:1671.json"}},{"package":{"name":"mysql-common","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.41-2.el9_5"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:1671.json"}},{"package":{"name":"mysql-devel","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.41-2.el9_5"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:1671.json"}},{"package":{"name":"mysql-errmsg","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.41-2.el9_5"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:1671.json"}},{"package":{"name":"mysql-libs","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.41-2.el9_5"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:1671.json"}},{"package":{"name":"mysql-server","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.41-2.el9_5"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:1671.json"}},{"package":{"name":"mysql-test","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/mysql-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.41-2.el9_5"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2025:1671.json"}}],"schema_version":"1.7.3"}