{"id":"RHSA-2017:2787","summary":"Red Hat Security Advisory: rh-mysql56-mysql security and bug fix update","modified":"2025-11-22T11:23:31Z","published":"2024-09-13T14:41:09Z","upstream":["CVE-2016-5483","CVE-2016-8327","CVE-2017-3238","CVE-2017-3244","CVE-2017-3257","CVE-2017-3258","CVE-2017-3265","CVE-2017-3273","CVE-2017-3291","CVE-2017-3302","CVE-2017-3305","CVE-2017-3308","CVE-2017-3309","CVE-2017-3312","CVE-2017-3313","CVE-2017-3317","CVE-2017-3318","CVE-2017-3450","CVE-2017-3452","CVE-2017-3453","CVE-2017-3456","CVE-2017-3461","CVE-2017-3462","CVE-2017-3463","CVE-2017-3464","CVE-2017-3599","CVE-2017-3600","CVE-2017-3633","CVE-2017-3634","CVE-2017-3636","CVE-2017-3641","CVE-2017-3647","CVE-2017-3648","CVE-2017-3649","CVE-2017-3651","CVE-2017-3652","CVE-2017-3653"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL"},{"type":"ARTICLE","url":"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-35.html"},{"type":"ARTICLE","url":"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-36.html"},{"type":"ARTICLE","url":"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-37.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414133"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414337"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414338"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414350"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414351"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414352"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414353"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414355"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422119"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1431690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1433010"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443359"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443363"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443364"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443365"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443369"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472683"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472684"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472686"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472693"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472703"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472704"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472705"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472708"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472711"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477575"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1482122"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2787.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5483"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5483"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5483"},{"type":"ARTICLE","url":"https://blog.tarq.io/cve-2016-5483-backdooring-mysqldump-backups/"},{"type":"ARTICLE","url":"https://blog.tarq.io/cve-2016-5483-galera-remote-command-execution-via-crafted-database-name/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8327"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8327"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8327"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3238"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3238"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3238"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3244"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3244"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3244"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3257"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3257"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3257"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3258"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3258"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3258"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3265"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3265"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3265"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3273"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3273"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3273"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3291"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3291"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3291"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3302"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3302"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3302"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3305"},{"type":"ARTICLE","url":"http://riddle.link/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3308"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3308"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3308"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3309"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3309"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3309"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3312"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3312"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3312"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3313"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3313"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3313"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3317"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3317"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3317"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3318"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3318"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3318"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3450"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3450"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3450"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3452"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3452"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3452"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3453"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3453"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3453"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3461"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3461"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3462"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3462"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3462"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3463"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3463"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3463"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3464"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3464"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3464"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3599"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3599"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3599"},{"type":"ARTICLE","url":"https://www.secforce.com/blog/2017/04/cve-2017-3599-pre-auth-mysql-remote-dos/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3600"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3600"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3600"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3633"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3633"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3634"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3634"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3634"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3636"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3636"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3636"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3641"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3641"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3641"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3647"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3647"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3647"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3648"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3648"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3648"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3649"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3649"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3649"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3651"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3651"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3651"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3652"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3652"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3652"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3653"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3653"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3653"}],"affected":[{"package":{"name":"rh-mysql56-mysql","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-bench","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-bench"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-common","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-config","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-config"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-devel","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-errmsg","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-server","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-test","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-mysql56-mysql-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-bench","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-bench"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-common","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-config","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-config"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-devel","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-errmsg","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-errmsg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-server","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}},{"package":{"name":"rh-mysql56-mysql-test","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-mysql56-mysql-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.37-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:2787.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}]}