rpm package
almalinux/mysql-selinux
pkg:rpm/almalinux/mysql-selinux
Vulnerabilities (53)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-50104 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to | ||
| CVE-2025-50102 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc | ||
| CVE-2025-50101 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc | ||
| CVE-2025-50100 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple | ||
| CVE-2025-50099 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to comp | ||
| CVE-2025-50098 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc | ||
| CVE-2025-50097 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via mult | ||
| CVE-2025-50096 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Serve | ||
| CVE-2025-50094 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.42, 8.4.5 and 9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL | ||
| CVE-2025-50093 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to | ||
| CVE-2025-50092 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to comp | ||
| CVE-2025-50091 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc | ||
| CVE-2025-50088 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to comp | ||
| CVE-2025-50087 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc | ||
| CVE-2025-50086 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multi | ||
| CVE-2025-50085 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to comp | ||
| CVE-2025-50084 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc | ||
| CVE-2025-50083 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protoco | ||
| CVE-2025-50082 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protoco | ||
| CVE-2025-50081 | — | < 1.0.14-1.el10_0 | 1.0.14-1.el10_0 | Jul 15, 2025 | Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple prot |
- CVE-2025-50104Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to
- CVE-2025-50102Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc
- CVE-2025-50101Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc
- CVE-2025-50100Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple
- CVE-2025-50099Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to comp
- CVE-2025-50098Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc
- CVE-2025-50097Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via mult
- CVE-2025-50096Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Serve
- CVE-2025-50094Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.42, 8.4.5 and 9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL
- CVE-2025-50093Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to
- CVE-2025-50092Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to comp
- CVE-2025-50091Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc
- CVE-2025-50088Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to comp
- CVE-2025-50087Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc
- CVE-2025-50086Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multi
- CVE-2025-50085Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to comp
- CVE-2025-50084Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc
- CVE-2025-50083Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protoco
- CVE-2025-50082Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protoco
- CVE-2025-50081Jul 15, 2025affected < 1.0.14-1.el10_0fixed 1.0.14-1.el10_0
Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple prot
Page 1 of 3