<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Redhat on FromDual GmbH</title><link>https://www.fromdual.com/tags/redhat/</link><description>Recent content in Redhat on FromDual GmbH</description><generator>Hugo</generator><language>en-GB</language><managingEditor>oli.sennhauser@fromdual.com (Oli Sennhauser)</managingEditor><webMaster>oli.sennhauser@fromdual.com (Oli Sennhauser)</webMaster><copyright>© FromDual GmbH</copyright><lastBuildDate>Mon, 21 Oct 2024 09:43:19 +0000</lastBuildDate><atom:link href="https://www.fromdual.com/tags/redhat/index.xml" rel="self" type="application/rss+xml"/><item><title>MariaDB and MySQL package holding or locking</title><link>https://www.fromdual.com/blog/mariadb-and-mysql-package-holding-or-locking/</link><pubDate>Fri, 07 Aug 2020 16:02:24 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/blog/mariadb-and-mysql-package-holding-or-locking/</guid><description>&lt;p&gt;Repositories from your favourite Linux distribution and from your favourite database software vendor get regular package updates. If you do periodic system upgrades (for example every 2 weeks as we do) you get the newest packages of a release series.&lt;br&gt;
Unfortunately recently the software vendors started not only to fix bugs in new releases but also to introduce new features. And when you fix bugs or introduce new stuff new bugs might appear.&lt;br&gt;
To avoid being hit unexpectedly by new bugs you do not want to upgrade untested software. To achieve this you want to keep/not upgrade some important packages. For example the MariaDB or MySQL server package.&lt;br&gt;
This package pinning is called package version lock on CentOS and Redhat and package holding on Debian and Ubuntu.&lt;/p&gt;</description></item><item><title>MySQL and MariaDB Security</title><link>https://www.fromdual.com/blog/mysql-security/</link><pubDate>Fri, 18 Jan 2013 09:27:09 +0000</pubDate><author>oli.sennhauser@fromdual.com (Oli Sennhauser)</author><guid>https://www.fromdual.com/blog/mysql-security/</guid><description>&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#mysql-security-products"&gt;MySQL Security Products&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#useful-security-links"&gt;Useful Security Links&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#security-vulnerabilities-fixed-in-mariadb"&gt;Security Vulnerabilities Fixed in MariaDB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#oracle-critical-patch-update-advisory-for-mysql"&gt;Oracle Critical Patch Update (CPU) Advisory for MySQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#redhat-centos-vulnerabilities"&gt;RedHat/CentOS vulnerabilities by CVE name&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#ubuntu-security-notice-for-mariadb"&gt;Ubuntu Security Notice (USN) for MariaDB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#ubuntu-security-notice-for-mysql"&gt;Ubuntu Security Notice (USN) for MySQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#debian-security-advisories"&gt;Debian Security Advisories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#debian-security-advisories-for-mysql"&gt;Debian Security Advisories for MySQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.exploit-db.com/search/?action=search&amp;amp;description=mysql" target="_blank" title="MySQL Exploits"&gt;MySQL Exploits&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#debian-security-advisories-for-mariadb"&gt;Debian Security Advisories for MariaDB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.exploit-db.com/search/?action=search&amp;amp;description=mariadb" target="_blank" title="MariaDB Exploits"&gt;MariaDB Exploits&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/mariadb-security-risk-matrix" target="_blank" title="MariaDB Security Risk Matrix"&gt;MariaDB Security Risk Matrix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/blog/mysql-security/#auscert"&gt;Cyber Emergency Response Team (CERT) in Australia and APAC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://hackerone.com/mariadb?type=team" target="_blank" title="MariaDB Security | HackerOne"&gt;MariaDB Security | HackerOne&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mysql-security-products"&gt;MySQL Security Products&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Database Firewall: &lt;a href="http://www.greensql.com/" target="_blank"&gt;GreenSQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;MySQL Database Security: &lt;a href="http://www.mcafee.com/us/products/database-security/mysql-plug-in.aspx" target="_blank"&gt;McAfee&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="useful-security-links"&gt;Useful Security Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://public.cyber.mil/announcement/stig-update-disa-releases-the-mariadb-enterprise-10-x-security-technical-implementation-guide/" target="_blank"&gt;STIG Update: DISA releases the MariaDB Enterprise 10.x Security Technical Implementation Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;OWASP: &lt;a href="https://cheatsheetseries.owasp.org/cheatsheets/Database_Security_Cheat_Sheet.html" target="_blank" title="Database Security Cheat Sheet"&gt;Database Security Cheat Sheet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_MySQL_Benchmark_v1.0.2.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;MySQL 4.1/5.0/5.1 Benchmark&lt;/a&gt; (v1.0.2)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_Oracle_MySQL_Community_Edition_5.6_Benchmark_v1.1.0.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;Oracle MySQL Community Server 5.6 Benchmark&lt;/a&gt; (v1.1.0)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_Oracle_MySQL_Community_Edition_5.7_Benchmark_v1.0.0.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;Oracle MySQL Community Server 5.7 Benchmark&lt;/a&gt; (v1.0.0)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_Oracle_MySQL_Enterprise_Edition_5.6_Benchmark_v1.1.0.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;Oracle MySQL Enterprise Edition 5.6 Benchmark&lt;/a&gt; (v1.1.0)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://benchmarks.cisecurity.org/" target="_blank" title="Center for Internet Security"&gt;CIS&lt;/a&gt; &lt;a href="https://benchmarks.cisecurity.org/tools2/mysql/CIS_Oracle_MySQL_Enterprise_Edition_5.7_Benchmark_v1.0.0.pdf" target="_blank" title="The Center for Internet Security CIS"&gt;Oracle MySQL Enterprise Edition 5.7 Benchmark&lt;/a&gt; (v1.0.0)&lt;/li&gt;
&lt;li&gt;MySQL Documentation: &lt;a href="http://dev.mysql.com/doc/refman/5.7/en/security.html" target="_blank"&gt;Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;BSI certified &lt;a href="https://www.bsi.bund.de/DE/Themen/ZertifizierungundAnerkennung/Produktzertifizierung/ZertifizierungnachCC/ZertifizierteProdukte/Serveranwendungen/Serveranwendungen_node.html#doc2966472bodyText1" target="_blank"&gt;database servers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.cvedetails.com/vulnerability-list/vendor_id-185/cvssscoremin-9/cvssscoremax-/Mysql.html" target="_blank"&gt;CVE Details&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://rhn.redhat.com/errata/RHSA-2013-0121.html" target="_blank" title="Low: mysql security and bug fix update"&gt;RHSA-2013:0121-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://rhn.redhat.com/errata/RHSA-2012-1462.html" target="_blank" title="Important: mysql security update"&gt;RHSA-2012:1462-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.grok.org.uk/mailman/listinfo/full-disclosure" target="_blank"&gt;&lt;a href="mailto:full-disclosure@lists.grok.org.uk"&gt;full-disclosure@lists.grok.org.uk&lt;/a&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://forums.mysql.com/list.php?30" target="_blank"&gt;MySQL Security Forum&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet" target="_blank" title="MySQL SQL Injection Cheat Sheet"&gt;MySQL SQL Injection Cheat Sheet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="security-vulnerabilities-fixed-in-mariadb"&gt;Security Vulnerabilities Fixed in MariaDB&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://mariadb.com/kb/en/mariadb/security/" target="_blank" title="Security Vulnerabilities Fixed in MariaDB"&gt;Security Vulnerabilities Fixed in MariaDB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fromdual.com/mariadb-security-risk-matrix/index.php" title="MariaDB Security Risk Matrix"&gt;MariaDB Security Risk Matrix&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="oracle-critical-patch-update-cpu-advisory-for-mysql"&gt;Oracle Critical Patch Update (CPU) Advisory for MySQL&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/technetwork/topics/security/alerts-086861.html" target="_blank" title="Oracle CPU Overview"&gt;Oracle Critical Patch Update Advisory - Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL" target="_blank" title="Oracle CPU 2024-10"&gt;Oracle Critical Patch Update Advisory - October 2024&lt;/a&gt; (45 fixes / 9.1 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2024verbose.html#MSQL" target="_blank" title="Oracle CPU 2024-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2024.html#AppendixMSQL" target="_blank" title="Oracle CPU 2024-07"&gt;Oracle Critical Patch Update Advisory - July 2024&lt;/a&gt; (37 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2024verbose.html#MSQL" target="_blank" title="Oracle CPU 2024-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixMSQL" target="_blank" title="Oracle CPU 2024-04"&gt;Oracle Critical Patch Update Advisory - April 2024&lt;/a&gt; (36 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2024verbose.html#MSQL" target="_blank" title="Oracle CPU 2024-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2024.html#AppendixMSQL" target="_blank" title="Oracle CPU 2024-01"&gt;Oracle Critical Patch Update Advisory - January 2024&lt;/a&gt; (40 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2024verbose.html#MSQL" target="_blank" title="Oracle CPU 2024-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixMSQL" target="_blank" title="Oracle CPU 2023-10"&gt;Oracle Critical Patch Update Advisory - October 2023&lt;/a&gt; (37 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2023verbose.html#MSQL" target="_blank" title="Oracle CPU 2023-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2023.html#AppendixMSQL" target="_blank" title="Oracle CPU 2023-07"&gt;Oracle Critical Patch Update Advisory - July 2023&lt;/a&gt; (24 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2023verbose.html#MSQL" target="_blank" title="Oracle CPU 2023-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixMSQL" target="_blank" title="Oracle CPU 2023-04"&gt;Oracle Critical Patch Update Advisory - April 2023&lt;/a&gt; (34 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2023verbose.html#MSQL" target="_blank" title="Oracle CPU 2023-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL" target="_blank" title="Oracle CPU 2023-01"&gt;Oracle Critical Patch Update Advisory - January 2023&lt;/a&gt; (37 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2023verbose.html#MSQL" target="_blank" title="Oracle CPU 2023-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL" target="_blank" title="Oracle CPU 2022-10"&gt;Oracle Critical Patch Update Advisory - October 2022&lt;/a&gt; (37 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2022verbose.html#MSQL" target="_blank" title="Oracle CPU 2022-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL" target="_blank" title="Oracle CPU 2022-07"&gt;Oracle Critical Patch Update Advisory - July 2022&lt;/a&gt; (34 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2022verbose.html#MSQL" target="_blank" title="Oracle CPU 2022-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL" target="_blank" title="Oracle CPU 2022-04"&gt;Oracle Critical Patch Update Advisory - April 2022&lt;/a&gt; (43 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2022verbose.html#MSQL" target="_blank" title="Oracle CPU 2022-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL" target="_blank" title="Oracle CPU 2022-01"&gt;Oracle Critical Patch Update Advisory - January 2022&lt;/a&gt; (78 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2022verbose.html#MSQL" target="_blank" title="Oracle CPU 2022-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2021.html#AppendixMSQL" target="_blank" title="Oracle CPU 2021-10"&gt;Oracle Critical Patch Update Advisory - October 2021&lt;/a&gt; (66 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2021verbose.html#MSQL" target="_blank" title="Oracle CPU 2021-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2021.html#AppendixMSQL" target="_blank" title="Oracle CPU 2021-07"&gt;Oracle Critical Patch Update Advisory - July 2021&lt;/a&gt; (41 fixes / 8.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2021verbose.html#MSQL" target="_blank" title="Oracle CPU 2021-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2021.html#AppendixMSQL" target="_blank" title="Oracle CPU 2021-04"&gt;Oracle Critical Patch Update Advisory - April 2021&lt;/a&gt; (49 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2021verbose.html#MSQL" target="_blank" title="Oracle CPU 2021-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2021.html#AppendixMSQL" target="_blank" title="Oracle CPU 2021-01"&gt;Oracle Critical Patch Update Advisory - January 2021&lt;/a&gt; (43 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2021verbose.html#MSQL" target="_blank" title="Oracle CPU 2021-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2020.html#AppendixMSQL" target="_blank" title="Oracle CPU 2020-10"&gt;Oracle Critical Patch Update Advisory - October 2020&lt;/a&gt; (53 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2020verbose.html#MSQL" target="_blank" title="Oracle CPU 2020-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2020.html#AppendixMSQL" target="_blank" title="Oracle CPU 2020-07"&gt;Oracle Critical Patch Update Advisory - July 2020&lt;/a&gt; (40 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2020verbose.html#MSQL" target="_blank" title="Oracle CPU 2020-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2020.html#AppendixMSQL" target="_blank" title="Oracle CPU 2020-04"&gt;Oracle Critical Patch Update Advisory - April 2020&lt;/a&gt; (45 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2020verbose.html#MSQL" target="_blank" title="Oracle CPU 2020-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2020.html#AppendixMSQL" target="_blank" title="Oracle CPU 2020-01"&gt;Oracle Critical Patch Update Advisory - January 2020&lt;/a&gt; (19 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2020verbose.html#MSQL" target="_blank" title="Oracle CPU 2020-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2019.html#AppendixMSQL" target="_blank" title="Oracle CPU 2019-10"&gt;Oracle Critical Patch Update Advisory - October 2019&lt;/a&gt; (34 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2019verbose.html#MSQL" target="_blank" title="Oracle CPU 2019-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2019.html#AppendixMSQL" target="_blank" title="Oracle CPU 2019-07"&gt;Oracle Critical Patch Update Advisory - July 2019&lt;/a&gt; (45 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2019verbose.html#MSQL" target="_blank" title="Oracle CPU 2019-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2019.html#AppendixMSQL" target="_blank" title="Oracle CPU 2019-04"&gt;Oracle Critical Patch Update Advisory - April 2019&lt;/a&gt; (45 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2019verbose.html#MSQL" target="_blank" title="Oracle CPU 2019-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2019.html#AppendixMSQL" target="_blank" title="Oracle CPU 2019-01"&gt;Oracle Critical Patch Update Advisory - January 2019&lt;/a&gt; (30 fixes / 9.1 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2019verbose.html#MSQL" target="_blank" title="Oracle CPU 2019-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2018.html#AppendixMSQL" target="_blank" title="Oracle CPU 2018-10"&gt;Oracle Critical Patch Update Advisory - October 2018&lt;/a&gt; (38 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2018verbose.html#MSQL" target="_blank" title="Oracle CPU 2018-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2018.html#AppendixMSQL" target="_blank" title="Oracle CPU 2018-07"&gt;Oracle Critical Patch Update Advisory - July 2018&lt;/a&gt; (31 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2018verbose.html#MSQL" target="_blank" title="Oracle CPU 2018-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2018.html#AppendixMSQL" target="_blank" title="Oracle CPU 2018-04"&gt;Oracle Critical Patch Update Advisory - April 2018&lt;/a&gt; (33 fixes / 7.7 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2018verbose.html#MSQL" target="_blank" title="Oracle CPU 2018-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2018.html#AppendixMSQL" target="_blank" title="Oracle CPU 2018-01"&gt;Oracle Critical Patch Update Advisory - January 2018&lt;/a&gt; (25 fixes / 8.1 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2018verbose.html#MSQL" target="_blank" title="Oracle CPU 2018-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2017.html#AppendixMSQL" target="_blank" title="Oracle CPU 2017-10"&gt;Oracle Critical Patch Update Advisory - October 2017&lt;/a&gt; (25 fixes / 8.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2017verbose.html#MSQL" target="_blank" title="Oracle CPU 2017-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2017.html#AppendixMSQL" target="_blank" title="Oracle CPU 2017-07"&gt;Oracle Critical Patch Update Advisory - July 2017&lt;/a&gt; (30 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2017verbose.html#MSQL" target="_blank" title="Oracle CPU 2017-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2017.html#AppendixMSQL" target="_blank" title="Oracle CPU 2017-04"&gt;Oracle Critical Patch Update Advisory - April 2017&lt;/a&gt; (39 fixes / 10.0 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2017verbose.html#MSQL" target="_blank" title="Oracle CPU 2017-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2017.html#AppendixMSQL" target="_blank" title="Oracle CPU 2017-01"&gt;Oracle Critical Patch Update Advisory - January 2017&lt;/a&gt; (27 fixes / 8.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2017verbose.html#MSQL" target="_blank" title="Oracle CPU 2017-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2016.html#AppendixMSQL" target="_blank" title="Oracle CPU 2016-10"&gt;Oracle Critical Patch Update Advisory - October 2016&lt;/a&gt; (31 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2016verbose.html#MSQL" target="_blank" title="Oracle CPU 2016-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2016.html#AppendixMSQL" target="_blank" title="Oracle CPU 2016-07"&gt;Oracle Critical Patch Update Advisory - July 2016&lt;/a&gt; (22 fixes / 8.1 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2016verbose.html#MSQL" target="_blank" title="Oracle CPU 2016-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2016.html#AppendixMSQL" target="_blank" title="Oracle CPU 2016-04"&gt;Oracle Critical Patch Update Advisory - April 2016&lt;/a&gt; (31 fixes / 9.8 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2016verbose.html#MSQL" target="_blank" title="Oracle CPU 2016-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2016.html#AppendixMSQL" target="_blank" title="Oracle CPU 2016-01"&gt;Oracle Critical Patch Update Advisory - January 2016&lt;/a&gt; (22 fixes / 7.2 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2016verbose.html#MSQL" target="_blank" title="Oracle CPU 2016-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2015.html#AppendixMSQL" target="_blank" title="Oracle CPU 2015-10"&gt;Oracle Critical Patch Update Advisory - October 2015&lt;/a&gt; (30 fixes / 9.0 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuoct2015verbose.html#MSQL" target="_blank" title="Oracle CPU 2015-10 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2015.html#AppendixMSQL" target="_blank" title="Oracle CPU 2015-07"&gt;Oracle Critical Patch Update Advisory - July 2015&lt;/a&gt; (18 fixes / 6.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujul2015verbose.html#MSQL" target="_blank" title="Oracle CPU 2015-07 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2015.html#AppendixMSQL" target="_blank" title="Oracle CPU 2015-04"&gt;Oracle Critical Patch Update Advisory - April 2015&lt;/a&gt; (26 fixes / 10.0 max score), &lt;a href="https://www.oracle.com/security-alerts/cpuapr2015verbose.html#MSQL" target="_blank" title="Oracle CPU 2015-04 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2015.html#AppendixMSQL" target="_blank" title="Oracle CPU 2015-01"&gt;Oracle Critical Patch Update Advisory - January 2015&lt;/a&gt; (9 fixes / 7.5 max score), &lt;a href="https://www.oracle.com/security-alerts/cpujan2015verbose.html#MSQL" target="_blank" title="Oracle CPU 2015-01 verbose text form"&gt;verbose text form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2014.html#AppendixMSQL" target="_blank" title="Oracle CPU 2014-10"&gt;Oracle Critical Patch Update Advisory - October 2014&lt;/a&gt; (24 fixes / 8.0 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2014.html#AppendixMSQL" target="_blank" title="Oracle CPU 2014-07"&gt;Oracle Critical Patch Update Advisory - July 2014&lt;/a&gt; (10 fixes / 6.5 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2014.html#AppendixMSQL" target="_blank" title="Oracle CPU 2014-04"&gt;Oracle Critical Patch Update Advisory - April 2014&lt;/a&gt; (14 fixes / 6.5 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2014.html#AppendixMSQL" target="_blank" title="Oracle CPU 2014-01"&gt;Oracle Critical Patch Update Advisory - January 2014&lt;/a&gt; (18 fixes / 10.0 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2013.html#AppendixMSQL" target="_blank" title="Oracle CPU 2013-10"&gt;Oracle Critical Patch Update Advisory - October 2013&lt;/a&gt; (8 fixes / 8.5 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2013.html#AppendixMSQL" target="_blank" title="Oracle CPU 2013-07"&gt;Oracle Critical Patch Update Advisory - July 2013&lt;/a&gt; (18 fixes / 6.8 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2013.html#AppendixMSQL" target="_blank" title="Oracle CPU 2013-04"&gt;Oracle Critical Patch Update Advisory - April 2013&lt;/a&gt; (25 fixes / 6.8 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2013.html#AppendixMSQL" target="_blank" title="Oracle CPU 2013-01"&gt;Oracle Critical Patch Update Advisory - January 2013&lt;/a&gt; (18 fixes / 9.0 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuoct2012.html#AppendixMSQL" target="_blank" title="Oracle CPU 2012-10"&gt;Oracle Critical Patch Update Advisory - October 2012&lt;/a&gt; (15 fixes / 9.0 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujul2012.html#AppendixMSQL" target="_blank" title="Oracle CPU 2012-07"&gt;Oracle Critical Patch Update Advisory - July 2012&lt;/a&gt; (6 fixes / 6.8 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpuapr2012.html#AppendixMSQL" target="_blank" title="Oracle CPU 2012-04"&gt;Oracle Critical Patch Update Advisory - April 2012&lt;/a&gt; (6 fixes / 6.8 max score)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/cpujan2012.html#AppendixMSQL" target="_blank" title="Oracle CPU 2012-01"&gt;Oracle Critical Patch Update Advisory - January 2012&lt;/a&gt; (27 fixes / 5.5 max score)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="redhatcentos-vulnerabilities-by-cve-name"&gt;RedHat/CentOS vulnerabilities by CVE name&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://access.redhat.com/security/cve/#/?q=mysql" target="_blank" title="Red Hat vulnerabilities by CVE name for MySQL"&gt;Red Hat vulnerabilities by CVE name for MySQL&lt;/a&gt;&lt;/p&gt;</description></item></channel></rss>