Operating System:

[RedHat]

Published:

15 August 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3119
                     rh-mysql80-mysql security update
                              15 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rh-mysql80-mysql
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
Impact/Access:     Modify Arbitrary Files   -- Existing Account
                   Delete Arbitrary Files   -- Existing Account
                   Denial of Service        -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-2879 CVE-2019-2834 CVE-2019-2830
                   CVE-2019-2826 CVE-2019-2819 CVE-2019-2815
                   CVE-2019-2814 CVE-2019-2812 CVE-2019-2811
                   CVE-2019-2810 CVE-2019-2808 CVE-2019-2805
                   CVE-2019-2803 CVE-2019-2802 CVE-2019-2801
                   CVE-2019-2800 CVE-2019-2798 CVE-2019-2797
                   CVE-2019-2796 CVE-2019-2795 CVE-2019-2789
                   CVE-2019-2785 CVE-2019-2784 CVE-2019-2780
                   CVE-2019-2778 CVE-2019-2774 CVE-2019-2758
                   CVE-2019-2757 CVE-2019-2755 CVE-2019-2752
                   CVE-2019-2740 CVE-2019-2739 CVE-2019-2738
                   CVE-2019-2737 CVE-2019-2695 CVE-2019-2694
                   CVE-2019-2693 CVE-2019-2691 CVE-2019-2689
                   CVE-2019-2688 CVE-2019-2687 CVE-2019-2686
                   CVE-2019-2685 CVE-2019-2683 CVE-2019-2681
                   CVE-2019-2644 CVE-2019-2636 CVE-2019-2635
                   CVE-2019-2634 CVE-2019-2631 CVE-2019-2630
                   CVE-2019-2628 CVE-2019-2627 CVE-2019-2626
                   CVE-2019-2625 CVE-2019-2624 CVE-2019-2623
                   CVE-2019-2620 CVE-2019-2617 CVE-2019-2614
                   CVE-2019-2607 CVE-2019-2606 CVE-2019-2596
                   CVE-2019-2593 CVE-2019-2592 CVE-2019-2589
                   CVE-2019-2587 CVE-2019-2585 CVE-2019-2584
                   CVE-2019-2581 CVE-2019-2580 CVE-2019-2539
                   CVE-2019-2537 CVE-2019-2536 CVE-2019-2535
                   CVE-2019-2534 CVE-2019-2533 CVE-2019-2532
                   CVE-2019-2531 CVE-2019-2530 CVE-2019-2529
                   CVE-2019-2528 CVE-2019-2510 CVE-2019-2507
                   CVE-2019-2503 CVE-2019-2502 CVE-2019-2495
                   CVE-2019-2494 CVE-2019-2486 CVE-2019-2482
                   CVE-2019-2481 CVE-2019-2455 CVE-2019-2436
                   CVE-2019-2434 CVE-2019-2420 

Reference:         ASB-2019.0202
                   ESB-2019.0308
                   ESB-2019.0205

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:2484

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: rh-mysql80-mysql security update
Advisory ID:       RHSA-2019:2484-01
Product:           Red Hat Software Collections
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2484
Issue date:        2019-08-14
CVE Names:         CVE-2019-2420 CVE-2019-2434 CVE-2019-2436 
                   CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 
                   CVE-2019-2486 CVE-2019-2494 CVE-2019-2495 
                   CVE-2019-2502 CVE-2019-2503 CVE-2019-2507 
                   CVE-2019-2510 CVE-2019-2528 CVE-2019-2529 
                   CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 
                   CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 
                   CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 
                   CVE-2019-2580 CVE-2019-2581 CVE-2019-2584 
                   CVE-2019-2585 CVE-2019-2587 CVE-2019-2589 
                   CVE-2019-2592 CVE-2019-2593 CVE-2019-2596 
                   CVE-2019-2606 CVE-2019-2607 CVE-2019-2614 
                   CVE-2019-2617 CVE-2019-2620 CVE-2019-2623 
                   CVE-2019-2624 CVE-2019-2625 CVE-2019-2626 
                   CVE-2019-2627 CVE-2019-2628 CVE-2019-2630 
                   CVE-2019-2631 CVE-2019-2634 CVE-2019-2635 
                   CVE-2019-2636 CVE-2019-2644 CVE-2019-2681 
                   CVE-2019-2683 CVE-2019-2685 CVE-2019-2686 
                   CVE-2019-2687 CVE-2019-2688 CVE-2019-2689 
                   CVE-2019-2691 CVE-2019-2693 CVE-2019-2694 
                   CVE-2019-2695 CVE-2019-2737 CVE-2019-2738 
                   CVE-2019-2739 CVE-2019-2740 CVE-2019-2752 
                   CVE-2019-2755 CVE-2019-2757 CVE-2019-2758 
                   CVE-2019-2774 CVE-2019-2778 CVE-2019-2780 
                   CVE-2019-2784 CVE-2019-2785 CVE-2019-2789 
                   CVE-2019-2795 CVE-2019-2796 CVE-2019-2797 
                   CVE-2019-2798 CVE-2019-2800 CVE-2019-2801 
                   CVE-2019-2802 CVE-2019-2803 CVE-2019-2805 
                   CVE-2019-2808 CVE-2019-2810 CVE-2019-2811 
                   CVE-2019-2812 CVE-2019-2814 CVE-2019-2815 
                   CVE-2019-2819 CVE-2019-2826 CVE-2019-2830 
                   CVE-2019-2834 CVE-2019-2879 
=====================================================================

1. Summary:

An update for rh-mysql80-mysql is now available for Red Hat Software
Collections.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

MySQL is a multi-user, multi-threaded SQL database server. It consists of
the MySQL server daemon, mysqld, and many client programs.

The following packages have been upgraded to a later upstream version:
rh-mysql80-mysql (8.0.17).

Security Fix(es):

* mysql: Server: Replication multiple unspecified vulnerabilities
(CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614,
CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755)

* mysql: Server: Optimizer multiple unspecified vulnerabilities
(CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530,
CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681,
CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689,
CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774,
CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810,
CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834)

* mysql: Server: Parser multiple unspecified vulnerabilities
(CVE-2019-2434, CVE-2019-2455, CVE-2019-2805)

* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482,
CVE-2019-2592)

* mysql: Server: Security: Privileges multiple unspecified vulnerabilities
(CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589,
CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778,
CVE-2019-2811, CVE-2019-2789)

* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494,
CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644)

* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502,
CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624,
CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879,
CVE-2019-2814)

* mysql: Server: Connection Handling unspecified vulnerability
(CVE-2019-2503)

* mysql: Server: Partition multiple unspecified vulnerabilities
(CVE-2019-2528, CVE-2019-2587)

* mysql: Server: Options multiple unspecified vulnerabilities
(CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752)

* mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536)

* mysql: Server: Connection unspecified vulnerability (CVE-2019-2539)

* mysql: Server: Information Schema unspecified vulnerability
(CVE-2019-2631)

* mysql: Server: Group Replication Plugin unspecified vulnerability
(CVE-2019-2636)

* mysql: Server: Security: Roles multiple unspecified vulnerabilities
(CVE-2019-2691, CVE-2019-2826)

* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737)

* mysql: Server: XML unspecified vulnerability (CVE-2019-2740)

* mysql: Server: Components / Services unspecified vulnerability
(CVE-2019-2780)

* mysql: Server: DML unspecified vulnerability (CVE-2019-2784)

* mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795)

* mysql: Client programs unspecified vulnerability (CVE-2019-2797)

* mysql: Server: FTS unspecified vulnerability (CVE-2019-2801)

* mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819)

* mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MySQL server daemon (mysqld) will be
restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1666738 - CVE-2019-2420 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666740 - CVE-2019-2434 mysql: Server: Parser unspecified vulnerability (CPU Jan 2019)
1666741 - CVE-2019-2436 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)
1666742 - CVE-2019-2455 mysql: Server: Parser unspecified vulnerability (CPU Jan 2019)
1666743 - CVE-2019-2481 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666744 - CVE-2019-2482 mysql: Server: PS unspecified vulnerability (CPU Jan 2019)
1666745 - CVE-2019-2486 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)
1666746 - CVE-2019-2494 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)
1666747 - CVE-2019-2495 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)
1666748 - CVE-2019-2502 mysql: InnoDB unspecified vulnerability (CPU Jan 2019)
1666749 - CVE-2019-2503 mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019)
1666750 - CVE-2019-2507 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666751 - CVE-2019-2510 mysql: InnoDB unspecified vulnerability (CPU Jan 2019)
1666753 - CVE-2019-2528 mysql: Server: Partition unspecified vulnerability (CPU Jan 2019)
1666755 - CVE-2019-2529 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666756 - CVE-2019-2530 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
1666757 - CVE-2019-2531 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)
1666758 - CVE-2019-2532 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)
1666759 - CVE-2019-2533 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)
1666760 - CVE-2019-2534 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)
1666761 - CVE-2019-2535 mysql: Server: Options unspecified vulnerability (CPU Jan 2019)
1666762 - CVE-2019-2536 mysql: Server: Packaging unspecified vulnerability (CPU Jan 2019)
1666763 - CVE-2019-2537 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)
1666764 - CVE-2019-2539 mysql: Server: Connection unspecified vulnerability (CPU Jan 2019)
1702958 - CVE-2019-2580 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702959 - CVE-2019-2581 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702960 - CVE-2019-2584 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702961 - CVE-2019-2585 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702962 - CVE-2019-2587 mysql: Server: Partition unspecified vulnerability (CPU Apr 2019)
1702963 - CVE-2019-2589 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702964 - CVE-2019-2592 mysql: Server: PS unspecified vulnerability (CPU Apr 2019)
1702965 - CVE-2019-2593 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702966 - CVE-2019-2596 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702967 - CVE-2019-2606 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702968 - CVE-2019-2607 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702969 - CVE-2019-2614 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702970 - CVE-2019-2617 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702971 - CVE-2019-2620 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702972 - CVE-2019-2623 mysql: Server: Options unspecified vulnerability (CPU Apr 2019)
1702973 - CVE-2019-2624 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702974 - CVE-2019-2625 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702975 - CVE-2019-2626 mysql: Server: DDL unspecified vulnerability (CPU Apr 2019)
1702976 - CVE-2019-2627 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702977 - CVE-2019-2628 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1702978 - CVE-2019-2630 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702979 - CVE-2019-2631 mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2019)
1702981 - CVE-2019-2635 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702982 - CVE-2019-2636 mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2019)
1702983 - CVE-2019-2644 mysql: Server: DDL unspecified vulnerability (CPU Apr 2019)
1702984 - CVE-2019-2681 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702985 - CVE-2019-2683 mysql: Server: Options unspecified vulnerability (CPU Apr 2019)
1702986 - CVE-2019-2685 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702987 - CVE-2019-2686 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702989 - CVE-2019-2687 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702990 - CVE-2019-2688 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702991 - CVE-2019-2689 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702992 - CVE-2019-2691 mysql: Server: Security: Roles unspecified vulnerability (CPU Apr 2019)
1702993 - CVE-2019-2693 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702994 - CVE-2019-2694 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702995 - CVE-2019-2695 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)
1702997 - CVE-2019-2634 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1731997 - CVE-2019-2737 mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)
1731998 - CVE-2019-2738 mysql: Server: Compiling unspecified vulnerability (CPU Jul 2019)
1731999 - CVE-2019-2739 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732000 - CVE-2019-2740 mysql: Server: XML unspecified vulnerability (CPU Jul 2019)
1732005 - CVE-2019-2752 mysql: Server: Options unspecified vulnerability (CPU Jul 2019)
1732006 - CVE-2019-2755 mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)
1732007 - CVE-2019-2757 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732008 - CVE-2019-2758 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732009 - CVE-2019-2774 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732010 - CVE-2019-2778 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732011 - CVE-2019-2780 mysql: Server: Components / Services unspecified vulnerability (CPU Jul 2019)
1732012 - CVE-2019-2784 mysql: Server: DML unspecified vulnerability (CPU Jul 2019)
1732013 - CVE-2019-2785 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732015 - CVE-2019-2789 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732017 - CVE-2019-2795 mysql: Server: Charsets unspecified vulnerability (CPU Jul 2019)
1732018 - CVE-2019-2796 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732019 - CVE-2019-2797 mysql: Client programs unspecified vulnerability (CPU Jul 2019)
1732020 - CVE-2019-2798 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732021 - CVE-2019-2800 mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)
1732022 - CVE-2019-2801 mysql: Server: FTS unspecified vulnerability (CPU Jul 2019)
1732023 - CVE-2019-2802 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732024 - CVE-2019-2803 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732025 - CVE-2019-2805 mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)
1732026 - CVE-2019-2808 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732027 - CVE-2019-2810 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732028 - CVE-2019-2811 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732029 - CVE-2019-2812 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732030 - CVE-2019-2814 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732031 - CVE-2019-2815 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732032 - CVE-2019-2819 mysql: Server: Security: Audit unspecified vulnerability (CPU Jul 2019)
1732034 - CVE-2019-2826 mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2019)
1732035 - CVE-2019-2830 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732036 - CVE-2019-2834 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)
1732037 - CVE-2019-2879 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)

6. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-mysql80-mysql-8.0.17-1.el7.src.rpm

aarch64:
rh-mysql80-mysql-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.aarch64.rpm

ppc64le:
rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x:
rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-mysql80-mysql-8.0.17-1.el7.src.rpm

aarch64:
rh-mysql80-mysql-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.aarch64.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.aarch64.rpm

ppc64le:
rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x:
rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64:
rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):

Source:
rh-mysql80-mysql-8.0.17-1.el7.src.rpm

ppc64le:
rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x:
rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64:
rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):

Source:
rh-mysql80-mysql-8.0.17-1.el7.src.rpm

ppc64le:
rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x:
rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64:
rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
rh-mysql80-mysql-8.0.17-1.el7.src.rpm

ppc64le:
rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x:
rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64:
rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):

Source:
rh-mysql80-mysql-8.0.17-1.el7.src.rpm

ppc64le:
rh-mysql80-mysql-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.ppc64le.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.ppc64le.rpm

s390x:
rh-mysql80-mysql-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.s390x.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.s390x.rpm

x86_64:
rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-mysql80-mysql-8.0.17-1.el7.src.rpm

x86_64:
rh-mysql80-mysql-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-common-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-config-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-debuginfo-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-devel-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-errmsg-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-server-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-syspaths-8.0.17-1.el7.x86_64.rpm
rh-mysql80-mysql-test-8.0.17-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-2420
https://access.redhat.com/security/cve/CVE-2019-2434
https://access.redhat.com/security/cve/CVE-2019-2436
https://access.redhat.com/security/cve/CVE-2019-2455
https://access.redhat.com/security/cve/CVE-2019-2481
https://access.redhat.com/security/cve/CVE-2019-2482
https://access.redhat.com/security/cve/CVE-2019-2486
https://access.redhat.com/security/cve/CVE-2019-2494
https://access.redhat.com/security/cve/CVE-2019-2495
https://access.redhat.com/security/cve/CVE-2019-2502
https://access.redhat.com/security/cve/CVE-2019-2503
https://access.redhat.com/security/cve/CVE-2019-2507
https://access.redhat.com/security/cve/CVE-2019-2510
https://access.redhat.com/security/cve/CVE-2019-2528
https://access.redhat.com/security/cve/CVE-2019-2529
https://access.redhat.com/security/cve/CVE-2019-2530
https://access.redhat.com/security/cve/CVE-2019-2531
https://access.redhat.com/security/cve/CVE-2019-2532
https://access.redhat.com/security/cve/CVE-2019-2533
https://access.redhat.com/security/cve/CVE-2019-2534
https://access.redhat.com/security/cve/CVE-2019-2535
https://access.redhat.com/security/cve/CVE-2019-2536
https://access.redhat.com/security/cve/CVE-2019-2537
https://access.redhat.com/security/cve/CVE-2019-2539
https://access.redhat.com/security/cve/CVE-2019-2580
https://access.redhat.com/security/cve/CVE-2019-2581
https://access.redhat.com/security/cve/CVE-2019-2584
https://access.redhat.com/security/cve/CVE-2019-2585
https://access.redhat.com/security/cve/CVE-2019-2587
https://access.redhat.com/security/cve/CVE-2019-2589
https://access.redhat.com/security/cve/CVE-2019-2592
https://access.redhat.com/security/cve/CVE-2019-2593
https://access.redhat.com/security/cve/CVE-2019-2596
https://access.redhat.com/security/cve/CVE-2019-2606
https://access.redhat.com/security/cve/CVE-2019-2607
https://access.redhat.com/security/cve/CVE-2019-2614
https://access.redhat.com/security/cve/CVE-2019-2617
https://access.redhat.com/security/cve/CVE-2019-2620
https://access.redhat.com/security/cve/CVE-2019-2623
https://access.redhat.com/security/cve/CVE-2019-2624
https://access.redhat.com/security/cve/CVE-2019-2625
https://access.redhat.com/security/cve/CVE-2019-2626
https://access.redhat.com/security/cve/CVE-2019-2627
https://access.redhat.com/security/cve/CVE-2019-2628
https://access.redhat.com/security/cve/CVE-2019-2630
https://access.redhat.com/security/cve/CVE-2019-2631
https://access.redhat.com/security/cve/CVE-2019-2634
https://access.redhat.com/security/cve/CVE-2019-2635
https://access.redhat.com/security/cve/CVE-2019-2636
https://access.redhat.com/security/cve/CVE-2019-2644
https://access.redhat.com/security/cve/CVE-2019-2681
https://access.redhat.com/security/cve/CVE-2019-2683
https://access.redhat.com/security/cve/CVE-2019-2685
https://access.redhat.com/security/cve/CVE-2019-2686
https://access.redhat.com/security/cve/CVE-2019-2687
https://access.redhat.com/security/cve/CVE-2019-2688
https://access.redhat.com/security/cve/CVE-2019-2689
https://access.redhat.com/security/cve/CVE-2019-2691
https://access.redhat.com/security/cve/CVE-2019-2693
https://access.redhat.com/security/cve/CVE-2019-2694
https://access.redhat.com/security/cve/CVE-2019-2695
https://access.redhat.com/security/cve/CVE-2019-2737
https://access.redhat.com/security/cve/CVE-2019-2738
https://access.redhat.com/security/cve/CVE-2019-2739
https://access.redhat.com/security/cve/CVE-2019-2740
https://access.redhat.com/security/cve/CVE-2019-2752
https://access.redhat.com/security/cve/CVE-2019-2755
https://access.redhat.com/security/cve/CVE-2019-2757
https://access.redhat.com/security/cve/CVE-2019-2758
https://access.redhat.com/security/cve/CVE-2019-2774
https://access.redhat.com/security/cve/CVE-2019-2778
https://access.redhat.com/security/cve/CVE-2019-2780
https://access.redhat.com/security/cve/CVE-2019-2784
https://access.redhat.com/security/cve/CVE-2019-2785
https://access.redhat.com/security/cve/CVE-2019-2789
https://access.redhat.com/security/cve/CVE-2019-2795
https://access.redhat.com/security/cve/CVE-2019-2796
https://access.redhat.com/security/cve/CVE-2019-2797
https://access.redhat.com/security/cve/CVE-2019-2798
https://access.redhat.com/security/cve/CVE-2019-2800
https://access.redhat.com/security/cve/CVE-2019-2801
https://access.redhat.com/security/cve/CVE-2019-2802
https://access.redhat.com/security/cve/CVE-2019-2803
https://access.redhat.com/security/cve/CVE-2019-2805
https://access.redhat.com/security/cve/CVE-2019-2808
https://access.redhat.com/security/cve/CVE-2019-2810
https://access.redhat.com/security/cve/CVE-2019-2811
https://access.redhat.com/security/cve/CVE-2019-2812
https://access.redhat.com/security/cve/CVE-2019-2814
https://access.redhat.com/security/cve/CVE-2019-2815
https://access.redhat.com/security/cve/CVE-2019-2819
https://access.redhat.com/security/cve/CVE-2019-2826
https://access.redhat.com/security/cve/CVE-2019-2830
https://access.redhat.com/security/cve/CVE-2019-2834
https://access.redhat.com/security/cve/CVE-2019-2879
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXVOxPNzjgjWX9erEAQjMXA/9Eihmyr36juKBY8YJ6hqFuMlWDEtXH/uI
/6z1r6cjHcLr4FU+qbt/q8lqQ/mKFBrfYgPrZe6RugoC52B4U4Zkt78Vy0WH4uFJ
dh2C6eR2IwFp/avJD3m8vaDTL6aHHXOYSiGJCegg5kjmZyXMWHgI6/bVhprwy1k8
+IXNSF9L87Ww/4teTv7L1eKchstpzZd+7V+ZS6JeaD1Cxu6vYV+Nrbo/J3362h1K
3Zf/aromzPBEl9XXzmqJawN/t1twTp2XAhV8is4FzkQ0XAy/0IoFc/GP34MHYZ2R
vwyeVehCmwtHBH8JrViQGE5HgeaE8fs7g3DqIefJmswB+NsYvw1rybPtgOhpew+W
MIZaKrzFuiYIl3VQMR5VT2ZVerwglle1uP2x/gYvm4LZsqfdJcwBCFiJhDITQ2cw
ZKdlBAs3MJtkJJpWn1kAIKcblmUXU4LRZkJtIH+VBpr0NLQVGwJ2UG93jD7Y74tI
3AH1YAaKHXuAjlpDw4qcWQsPnbegPaWesffkNty6+aLdt4y8nJ8IQWm5aMqSU5xW
+6MQ9sf2qIRLYj+RFtNQJP+K0sK32DJjtrZuLDWD2Fhg9w9XG6SZxuSTxfVstBqi
M42OspadVMdFto1IQuv9/9I7cS9l5srfVnjq7kO6yuENIm7/tJX+tjU4jagbfZ3L
zLIpZwaofO8=
=dahN
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXVSxp2aOgq3Tt24GAQhO/xAAk9jWo2P/a/PBAU/11gi5XlYk4D0e9H2s
aDmRFRb3icJ7nNg93I4YnYQ0afurIdjaxpJDiXuH0VdA2iC5I5gMlkw3Ku40Nvpj
7fgzAXq7nZAuXvYORFT3EXDL9YBBFcJxXlxNTtNjU/J+qHYkJL/Lhb0lEnO4s9r3
fMYB66AIIR8krOKSD+vjiKw+5E0I8Xjfuz2QIteTibbo0ARxiE87KzALV4S4qPaW
i+hUo5PpYG1NPUJK9h4Fw2ER6iZrAZsdym8BMYoIjSwv2qlXlv+PzX7yKfb4FM7j
htAlfkcZLguihOHLnvFqxjuz4/1yTjqY9/mIif3JZLemARplkIR3mAHnVmAtzuLu
0Apz7Bx32BtRNrUNDZ5zb2Ii13VrS+PU06ByGwolf3c8xzYsXttJuubc3ygUeKQL
zD2571kvl0DuEqr92YVFTgyixfU1dGYr/J/0LtfA0Jxd72dB2iiV8SppcLtpT0tk
+d6bE5rhqH4EAhUR2rdMjANMOraZtdPVVgTUbYxgbf6W9f2ePUjvdZzRrFbhB06f
vmFPSkGnM2qVWpHz9csADcTpg+99dCQY5S6/P4atz1rTTicSlKh2p+gj6WYSXEFD
C0SGgxQbh6UQVk6DI8dA7rpYS7220/3HxubwHRZcPQGgFrJG5HmA2jyncPmv75F7
N04ne7X+Tlk=
=UyUu
-----END PGP SIGNATURE-----