{"id":"RHSA-2016:2749","summary":"Red Hat Security Advisory: rh-mysql56-mysql security update","modified":"2025-11-22T11:14:58Z","published":"2024-09-15T23:45:59Z","upstream":["CVE-2016-3492","CVE-2016-5507","CVE-2016-5616","CVE-2016-5617","CVE-2016-5626","CVE-2016-5629","CVE-2016-6662","CVE-2016-6663","CVE-2016-6664","CVE-2016-8283"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL"},{"type":"ARTICLE","url":"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html"},{"type":"ARTICLE","url":"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-34.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375198"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378936"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386554"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386564"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386568"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386572"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386585"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2749.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3492"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3492"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3492"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5507"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5507"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5507"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5616"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5616"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5616"},{"type":"ARTICLE","url":"https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5617"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5617"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5617"},{"type":"ARTICLE","url":"https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5626"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5626"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5626"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5629"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5629"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5629"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6662"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6662"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6662"},{"type":"ARTICLE","url":"https://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6663"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6663"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6663"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6664"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6664"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8283"}],"affected":[{"package":{"name":"rh-mysql56-mysql","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-bench","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-bench"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-common","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-config","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-config"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-devel","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-errmsg","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-server","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-test","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-bench","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-bench"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-common","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-config","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-config"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-devel","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-errmsg","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-server","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}},{"package":{"name":"rh-mysql56-mysql-test","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.34-2.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2749.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}