-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3142
                         mysql:8.0 security update
                              16 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mysql:8.0
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 8
                   Red Hat Enterprise Linux WS/Desktop 8
Impact/Access:     Modify Arbitrary Files   -- Existing Account
                   Delete Arbitrary Files   -- Existing Account
                   Denial of Service        -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-2879 CVE-2019-2834 CVE-2019-2830
                   CVE-2019-2826 CVE-2019-2819 CVE-2019-2815
                   CVE-2019-2814 CVE-2019-2812 CVE-2019-2811
                   CVE-2019-2810 CVE-2019-2808 CVE-2019-2805
                   CVE-2019-2803 CVE-2019-2802 CVE-2019-2801
                   CVE-2019-2800 CVE-2019-2798 CVE-2019-2797
                   CVE-2019-2796 CVE-2019-2795 CVE-2019-2789
                   CVE-2019-2785 CVE-2019-2784 CVE-2019-2780
                   CVE-2019-2778 CVE-2019-2774 CVE-2019-2758
                   CVE-2019-2757 CVE-2019-2755 CVE-2019-2752
                   CVE-2019-2740 CVE-2019-2739 CVE-2019-2738
                   CVE-2019-2737 CVE-2019-2695 CVE-2019-2694
                   CVE-2019-2693 CVE-2019-2691 CVE-2019-2689
                   CVE-2019-2688 CVE-2019-2687 CVE-2019-2686
                   CVE-2019-2685 CVE-2019-2683 CVE-2019-2681
                   CVE-2019-2644 CVE-2019-2636 CVE-2019-2635
                   CVE-2019-2634 CVE-2019-2631 CVE-2019-2630
                   CVE-2019-2628 CVE-2019-2627 CVE-2019-2626
                   CVE-2019-2625 CVE-2019-2624 CVE-2019-2623
                   CVE-2019-2620 CVE-2019-2617 CVE-2019-2614
                   CVE-2019-2607 CVE-2019-2606 CVE-2019-2596
                   CVE-2019-2593 CVE-2019-2592 CVE-2019-2589
                   CVE-2019-2587 CVE-2019-2585 CVE-2019-2584
                   CVE-2019-2581 CVE-2019-2580 CVE-2019-2539
                   CVE-2019-2537 CVE-2019-2536 CVE-2019-2535
                   CVE-2019-2534 CVE-2019-2533 CVE-2019-2532
                   CVE-2019-2531 CVE-2019-2530 CVE-2019-2529
                   CVE-2019-2528 CVE-2019-2510 CVE-2019-2507
                   CVE-2019-2503 CVE-2019-2502 CVE-2019-2495
                   CVE-2019-2494 CVE-2019-2486 CVE-2019-2482
                   CVE-2019-2481 CVE-2019-2455 CVE-2019-2436
                   CVE-2019-2434 CVE-2019-2420 

Reference:         ASB-2019.0202
                   ESB-2019.3113
                   ESB-2019.2967
                   ESB-2019.0205

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:2511

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: mysql:8.0 security update
Advisory ID:       RHSA-2019:2511-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2511
Issue date:        2019-08-15
CVE Names:         CVE-2019-2420 CVE-2019-2434 CVE-2019-2436 
                   CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 
                   CVE-2019-2486 CVE-2019-2494 CVE-2019-2495 
                   CVE-2019-2502 CVE-2019-2503 CVE-2019-2507 
                   CVE-2019-2510 CVE-2019-2528 CVE-2019-2529 
                   CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 
                   CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 
                   CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 
                   CVE-2019-2580 CVE-2019-2581 CVE-2019-2584 
                   CVE-2019-2585 CVE-2019-2587 CVE-2019-2589 
                   CVE-2019-2592 CVE-2019-2593 CVE-2019-2596 
                   CVE-2019-2606 CVE-2019-2607 CVE-2019-2614 
                   CVE-2019-2617 CVE-2019-2620 CVE-2019-2623 
                   CVE-2019-2624 CVE-2019-2625 CVE-2019-2626 
                   CVE-2019-2627 CVE-2019-2628 CVE-2019-2630 
                   CVE-2019-2631 CVE-2019-2634 CVE-2019-2635 
                   CVE-2019-2636 CVE-2019-2644 CVE-2019-2681 
                   CVE-2019-2683 CVE-2019-2685 CVE-2019-2686 
                   CVE-2019-2687 CVE-2019-2688 CVE-2019-2689 
                   CVE-2019-2691 CVE-2019-2693 CVE-2019-2694 
                   CVE-2019-2695 CVE-2019-2737 CVE-2019-2738 
                   CVE-2019-2739 CVE-2019-2740 CVE-2019-2752 
                   CVE-2019-2755 CVE-2019-2757 CVE-2019-2758 
                   CVE-2019-2774 CVE-2019-2778 CVE-2019-2780 
                   CVE-2019-2784 CVE-2019-2785 CVE-2019-2789 
                   CVE-2019-2795 CVE-2019-2796 CVE-2019-2797 
                   CVE-2019-2798 CVE-2019-2800 CVE-2019-2801 
                   CVE-2019-2802 CVE-2019-2803 CVE-2019-2805 
                   CVE-2019-2808 CVE-2019-2810 CVE-2019-2811 
                   CVE-2019-2812 CVE-2019-2814 CVE-2019-2815 
                   CVE-2019-2819 CVE-2019-2826 CVE-2019-2830 
                   CVE-2019-2834 CVE-2019-2879 
=====================================================================

1. Summary:

An update for the mysql:8.0 module is now available for Red Hat Enterprise
Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

MySQL is a multi-user, multi-threaded SQL database server. It consists of
the MySQL server daemon, mysqld, and many client programs.

The following packages have been upgraded to a later upstream version:
mysql (8.0.17).

Security Fix(es):

* mysql: Server: Replication multiple unspecified vulnerabilities
(CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614,
CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755)

* mysql: Server: Optimizer multiple unspecified vulnerabilities
(CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530,
CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681,
CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689,
CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774,
CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810,
CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834)

* mysql: Server: Parser multiple unspecified vulnerabilities
(CVE-2019-2434, CVE-2019-2455, CVE-2019-2805)

* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482,
CVE-2019-2592)

* mysql: Server: Security: Privileges multiple unspecified vulnerabilities
(CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589,
CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778,
CVE-2019-2811, CVE-2019-2789)

* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494,
CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644)

* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502,
CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624,
CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879,
CVE-2019-2814)

* mysql: Server: Connection Handling unspecified vulnerability
(CVE-2019-2503)

* mysql: Server: Partition multiple unspecified vulnerabilities
(CVE-2019-2528, CVE-2019-2587)

* mysql: Server: Options multiple unspecified vulnerabilities
(CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752)

* mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536)

* mysql: Server: Connection unspecified vulnerability (CVE-2019-2539)

* mysql: Server: Information Schema unspecified vulnerability
(CVE-2019-2631)

* mysql: Server: Group Replication Plugin unspecified vulnerability
(CVE-2019-2636)

* mysql: Server: Security: Roles multiple unspecified vulnerabilities
(CVE-2019-2691, CVE-2019-2826)

* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737)

* mysql: Server: XML unspecified vulnerability (CVE-2019-2740)

* mysql: Server: Components / Services unspecified vulnerability
(CVE-2019-2780)

* mysql: Server: DML unspecified vulnerability (CVE-2019-2784)

* mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795)

* mysql: Client programs unspecified vulnerability (CVE-2019-2797)

* mysql: Server: FTS unspecified vulnerability (CVE-2019-2801)

* mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819)

* mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MySQL server daemon (mysqld) will be
restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1666738 - CVE-2019-2420 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666740 - CVE-2019-2434 mysql: Server: Parser unspecified vulnerability (CPU Jan 2019)
1666741 - CVE-2019-2436 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)
1666742 - CVE-2019-2455 mysql: Server: Parser unspecified vulnerability (CPU Jan 2019)
1666743 - CVE-2019-2481 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666744 - CVE-2019-2482 mysql: Server: PS unspecified vulnerability (CPU Jan 2019)
1666745 - CVE-2019-2486 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)
1666746 - CVE-2019-2494 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)
1666747 - CVE-2019-2495 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)
1666748 - CVE-2019-2502 mysql: InnoDB unspecified vulnerability (CPU Jan 2019)
1666749 - CVE-2019-2503 mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019)
1666750 - CVE-2019-2507 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666751 - CVE-2019-2510 mysql: InnoDB unspecified vulnerability (CPU Jan 2019)
1666753 - CVE-2019-2528 mysql: Server: Partition unspecified vulnerability (CPU Jan 2019)
1666755 - CVE-2019-2529 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666756 - CVE-2019-2530 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666757 - CVE-2019-2531 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)
1666758 - CVE-2019-2532 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)
1666759 - CVE-2019-2533 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)
1666760 - CVE-2019-2534 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)
1666761 - CVE-2019-2535 mysql: Server: Options unspecified vulnerability (CPU Jan 2019)
1666762 - CVE-2019-2536 mysql: Server: Packaging unspecified vulnerability (CPU Jan 2019)
1666763 - CVE-2019-2537 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)
1666764 - CVE-2019-2539 mysql: Server: Connection unspecified vulnerability (CPU Jan 2019)
1702958 - CVE-2019-2580 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702959 - CVE-2019-2581 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702960 - CVE-2019-2584 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702961 - CVE-2019-2585 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702962 - CVE-2019-2587 mysql: Server: Partition unspecified vulnerability (CPU Apr 2019)
1702963 - CVE-2019-2589 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702964 - CVE-2019-2592 mysql: Server: PS unspecified vulnerability (CPU Apr 2019)
1702965 - CVE-2019-2593 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702966 - CVE-2019-2596 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702967 - CVE-2019-2606 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702968 - CVE-2019-2607 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702969 - CVE-2019-2614 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702970 - CVE-2019-2617 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702971 - CVE-2019-2620 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702972 - CVE-2019-2623 mysql: Server: Options unspecified vulnerability (CPU Apr 2019)
1702973 - CVE-2019-2624 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702974 - CVE-2019-2625 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702975 - CVE-2019-2626 mysql: Server: DDL unspecified vulnerability (CPU Apr 2019)
1702976 - CVE-2019-2627 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702977 - CVE-2019-2628 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702978 - CVE-2019-2630 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702979 - CVE-2019-2631 mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2019)
1702981 - CVE-2019-2635 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702982 - CVE-2019-2636 mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2019)
1702983 - CVE-2019-2644 mysql: Server: DDL unspecified vulnerability (CPU Apr 2019)
1702984 - CVE-2019-2681 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702985 - CVE-2019-2683 mysql: Server: Options unspecified vulnerability (CPU Apr 2019)
1702986 - CVE-2019-2685 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702987 - CVE-2019-2686 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702989 - CVE-2019-2687 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702990 - CVE-2019-2688 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702991 - CVE-2019-2689 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702992 - CVE-2019-2691 mysql: Server: Security: Roles unspecified vulnerability (CPU Apr 2019)
1702993 - CVE-2019-2693 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702994 - CVE-2019-2694 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702995 - CVE-2019-2695 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702997 - CVE-2019-2634 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1731997 - CVE-2019-2737 mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)
1731998 - CVE-2019-2738 mysql: Server: Compiling unspecified vulnerability (CPU Jul 2019)
1731999 - CVE-2019-2739 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732000 - CVE-2019-2740 mysql: Server: XML unspecified vulnerability (CPU Jul 2019)
1732005 - CVE-2019-2752 mysql: Server: Options unspecified vulnerability (CPU Jul 2019)
1732006 - CVE-2019-2755 mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)
1732007 - CVE-2019-2757 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732008 - CVE-2019-2758 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732009 - CVE-2019-2774 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732010 - CVE-2019-2778 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732011 - CVE-2019-2780 mysql: Server: Components / Services unspecified vulnerability (CPU Jul 2019)
1732012 - CVE-2019-2784 mysql: Server: DML unspecified vulnerability (CPU Jul 2019)
1732013 - CVE-2019-2785 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732015 - CVE-2019-2789 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732017 - CVE-2019-2795 mysql: Server: Charsets unspecified vulnerability (CPU Jul 2019)
1732018 - CVE-2019-2796 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732019 - CVE-2019-2797 mysql: Client programs unspecified vulnerability (CPU Jul 2019)
1732020 - CVE-2019-2798 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732021 - CVE-2019-2800 mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)
1732022 - CVE-2019-2801 mysql: Server: FTS unspecified vulnerability (CPU Jul 2019)
1732023 - CVE-2019-2802 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732024 - CVE-2019-2803 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732025 - CVE-2019-2805 mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)
1732026 - CVE-2019-2808 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732027 - CVE-2019-2810 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732028 - CVE-2019-2811 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732029 - CVE-2019-2812 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732030 - CVE-2019-2814 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732031 - CVE-2019-2815 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732032 - CVE-2019-2819 mysql: Server: Security: Audit unspecified vulnerability (CPU Jul 2019)
1732034 - CVE-2019-2826 mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2019)
1732035 - CVE-2019-2830 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732036 - CVE-2019-2834 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732037 - CVE-2019-2879 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
mecab-0.996-1.module+el8.0.0+3898+e09bb8de.9.src.rpm
mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.src.rpm
mysql-8.0.17-3.module+el8.0.0+3898+e09bb8de.src.rpm

aarch64:
mecab-0.996-1.module+el8.0.0+3898+e09bb8de.9.aarch64.rpm
mecab-debuginfo-0.996-1.module+el8.0.0+3898+e09bb8de.9.aarch64.rpm
mecab-debugsource-0.996-1.module+el8.0.0+3898+e09bb8de.9.aarch64.rpm
mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-common-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-debugsource-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-devel-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-devel-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-errmsg-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-libs-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-libs-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-server-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-server-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-test-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm
mysql-test-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.aarch64.rpm

ppc64le:
mecab-0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le.rpm
mecab-debuginfo-0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le.rpm
mecab-debugsource-0.996-1.module+el8.0.0+3898+e09bb8de.9.ppc64le.rpm
mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-common-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-debugsource-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-devel-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-devel-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-errmsg-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-libs-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-libs-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-server-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-server-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-test-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm
mysql-test-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.ppc64le.rpm

s390x:
mecab-0.996-1.module+el8.0.0+3898+e09bb8de.9.s390x.rpm
mecab-debuginfo-0.996-1.module+el8.0.0+3898+e09bb8de.9.s390x.rpm
mecab-debugsource-0.996-1.module+el8.0.0+3898+e09bb8de.9.s390x.rpm
mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x.rpm
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-common-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-debugsource-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-devel-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-devel-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-errmsg-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-libs-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-libs-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-server-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-server-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-test-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm
mysql-test-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.s390x.rpm

x86_64:
mecab-0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64.rpm
mecab-debuginfo-0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64.rpm
mecab-debugsource-0.996-1.module+el8.0.0+3898+e09bb8de.9.x86_64.rpm
mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-common-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-debugsource-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-devel-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-devel-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-errmsg-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-libs-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-libs-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-server-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-server-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-test-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm
mysql-test-debuginfo-8.0.17-3.module+el8.0.0+3898+e09bb8de.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-2420
https://access.redhat.com/security/cve/CVE-2019-2434
https://access.redhat.com/security/cve/CVE-2019-2436
https://access.redhat.com/security/cve/CVE-2019-2455
https://access.redhat.com/security/cve/CVE-2019-2481
https://access.redhat.com/security/cve/CVE-2019-2482
https://access.redhat.com/security/cve/CVE-2019-2486
https://access.redhat.com/security/cve/CVE-2019-2494
https://access.redhat.com/security/cve/CVE-2019-2495
https://access.redhat.com/security/cve/CVE-2019-2502
https://access.redhat.com/security/cve/CVE-2019-2503
https://access.redhat.com/security/cve/CVE-2019-2507
https://access.redhat.com/security/cve/CVE-2019-2510
https://access.redhat.com/security/cve/CVE-2019-2528
https://access.redhat.com/security/cve/CVE-2019-2529
https://access.redhat.com/security/cve/CVE-2019-2530
https://access.redhat.com/security/cve/CVE-2019-2531
https://access.redhat.com/security/cve/CVE-2019-2532
https://access.redhat.com/security/cve/CVE-2019-2533
https://access.redhat.com/security/cve/CVE-2019-2534
https://access.redhat.com/security/cve/CVE-2019-2535
https://access.redhat.com/security/cve/CVE-2019-2536
https://access.redhat.com/security/cve/CVE-2019-2537
https://access.redhat.com/security/cve/CVE-2019-2539
https://access.redhat.com/security/cve/CVE-2019-2580
https://access.redhat.com/security/cve/CVE-2019-2581
https://access.redhat.com/security/cve/CVE-2019-2584
https://access.redhat.com/security/cve/CVE-2019-2585
https://access.redhat.com/security/cve/CVE-2019-2587
https://access.redhat.com/security/cve/CVE-2019-2589
https://access.redhat.com/security/cve/CVE-2019-2592
https://access.redhat.com/security/cve/CVE-2019-2593
https://access.redhat.com/security/cve/CVE-2019-2596
https://access.redhat.com/security/cve/CVE-2019-2606
https://access.redhat.com/security/cve/CVE-2019-2607
https://access.redhat.com/security/cve/CVE-2019-2614
https://access.redhat.com/security/cve/CVE-2019-2617
https://access.redhat.com/security/cve/CVE-2019-2620
https://access.redhat.com/security/cve/CVE-2019-2623
https://access.redhat.com/security/cve/CVE-2019-2624
https://access.redhat.com/security/cve/CVE-2019-2625
https://access.redhat.com/security/cve/CVE-2019-2626
https://access.redhat.com/security/cve/CVE-2019-2627
https://access.redhat.com/security/cve/CVE-2019-2628
https://access.redhat.com/security/cve/CVE-2019-2630
https://access.redhat.com/security/cve/CVE-2019-2631
https://access.redhat.com/security/cve/CVE-2019-2634
https://access.redhat.com/security/cve/CVE-2019-2635
https://access.redhat.com/security/cve/CVE-2019-2636
https://access.redhat.com/security/cve/CVE-2019-2644
https://access.redhat.com/security/cve/CVE-2019-2681
https://access.redhat.com/security/cve/CVE-2019-2683
https://access.redhat.com/security/cve/CVE-2019-2685
https://access.redhat.com/security/cve/CVE-2019-2686
https://access.redhat.com/security/cve/CVE-2019-2687
https://access.redhat.com/security/cve/CVE-2019-2688
https://access.redhat.com/security/cve/CVE-2019-2689
https://access.redhat.com/security/cve/CVE-2019-2691
https://access.redhat.com/security/cve/CVE-2019-2693
https://access.redhat.com/security/cve/CVE-2019-2694
https://access.redhat.com/security/cve/CVE-2019-2695
https://access.redhat.com/security/cve/CVE-2019-2737
https://access.redhat.com/security/cve/CVE-2019-2738
https://access.redhat.com/security/cve/CVE-2019-2739
https://access.redhat.com/security/cve/CVE-2019-2740
https://access.redhat.com/security/cve/CVE-2019-2752
https://access.redhat.com/security/cve/CVE-2019-2755
https://access.redhat.com/security/cve/CVE-2019-2757
https://access.redhat.com/security/cve/CVE-2019-2758
https://access.redhat.com/security/cve/CVE-2019-2774
https://access.redhat.com/security/cve/CVE-2019-2778
https://access.redhat.com/security/cve/CVE-2019-2780
https://access.redhat.com/security/cve/CVE-2019-2784
https://access.redhat.com/security/cve/CVE-2019-2785
https://access.redhat.com/security/cve/CVE-2019-2789
https://access.redhat.com/security/cve/CVE-2019-2795
https://access.redhat.com/security/cve/CVE-2019-2796
https://access.redhat.com/security/cve/CVE-2019-2797
https://access.redhat.com/security/cve/CVE-2019-2798
https://access.redhat.com/security/cve/CVE-2019-2800
https://access.redhat.com/security/cve/CVE-2019-2801
https://access.redhat.com/security/cve/CVE-2019-2802
https://access.redhat.com/security/cve/CVE-2019-2803
https://access.redhat.com/security/cve/CVE-2019-2805
https://access.redhat.com/security/cve/CVE-2019-2808
https://access.redhat.com/security/cve/CVE-2019-2810
https://access.redhat.com/security/cve/CVE-2019-2811
https://access.redhat.com/security/cve/CVE-2019-2812
https://access.redhat.com/security/cve/CVE-2019-2814
https://access.redhat.com/security/cve/CVE-2019-2815
https://access.redhat.com/security/cve/CVE-2019-2819
https://access.redhat.com/security/cve/CVE-2019-2826
https://access.redhat.com/security/cve/CVE-2019-2830
https://access.redhat.com/security/cve/CVE-2019-2834
https://access.redhat.com/security/cve/CVE-2019-2879
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=pkv8
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXVX/TWaOgq3Tt24GAQheRRAAkwLmJK57FXSnkPnrvcLk2dtGVMbLPJi0
5SYVP8SexguiElcfslVVth4IQKPJImftjhB2nf/KEsnlZckE+lF/xnBx9cqM0wP1
eqMAz4sNssvJjtTgm8JoWMs2FbR2OYPeh4vXbaqiXyQt9h4JURS+1sbwGQGJwOpL
M2qHNgwtnyjD4FOJzpYchoNCs7oH6bSLnY0L9j4i75O/GGubG5H/PRts6oSI25eY
Z8gKmMOHpqDvW7gHkxKuIhA8mfZkoYK1WT7kFy8YOkQedkjTtZMOEF7tUbdQR+r/
ZkCNg0vhEsNkjmALAU6C7xl60ccuuUPHmY4mP33edpIPsWkbfAVFH9RXxJQmMJeT
hPaeqK//KVfwPAMuKuki2nivi8w9Rk3n6YeIi3kkKn6qeuioWwWxI/PYZwMN1OON
GRL2vxDt9inXk+fpKz4byvLwldXYRErEVh3K/5OonEDd504hamqOcJKW32/i2iJ6
OfW0McONqfYo9rmVcwD22kjSScwcKQJISkvUL+g7ZIUHkQ/zqnvayPJdPV1RPiE3
c7aVj5nZOykONWbO/wznIGfl7NHbcb4F5HjDlzjQMB0wAq/GrAetYMlZ+htyU2Id
1SFwXLwxAsxldnsrB9UAEOyBPInR32tNTtsDut2t7/uMhFVtwU6NeEngDZptIcBu
Qks9zUlQPtE=
=IRiG
-----END PGP SIGNATURE-----