An update for rh-mysql56-mysql is now available for Red Hat SoftwareCollections.Red Hat Product Security has rated this update as having a security impact ofCritical.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

MySQL is a multi-user, multi-threaded SQL database server.
It consists of theMySQL server daemon, mysqld, and many client programs.The following packages have been upgraded to a newer upstream version:rh-mysql56-mysql (5.6.30).Security Fix(es):* This update fixes several vulnerabilities in the MySQL database server.Information about these flaws can be found on the Oracle Critical Patch UpdateAdvisory pages, listed in the References section. (CVE-2015-4792, CVE-2015-4800,CVE-2015-4802, CVE-2015-4815, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836,CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4870, CVE-2015-4890,CVE-2015-4910, CVE-2015-4913, CVE-2016-0503, CVE-2016-0504, CVE-2016-0505,CVE-2016-0546, CVE-2016-0595, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598,CVE-2016-0600, CVE-2016-0605, CVE-2016-0606, CVE-2016-0607, CVE-2016-0608,CVE-2016-0609, CVE-2016-0610, CVE-2016-0611, CVE-2016-0639, CVE-2016-0640,CVE-2016-0641, CVE-2016-0642, CVE-2016-0643, CVE-2016-0644, CVE-2016-0646,CVE-2016-0647, CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0655,CVE-2016-0661, CVE-2016-0665, CVE-2016-0666, CVE-2016-0668, CVE-2016-2047)
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing this update, the MySQL server daemon (mysqld) will be restartedautomatically.Red Hat Software Collections 1 for RHEL 6

SRPMS:
rh-mysql56-mysql-5.6.30-1.el6.src.rpm
    MD5: 0ecf0f02586f3846e631ffec038097abSHA-256: 741df53dc63ad8ad6a864ec4ff824e81a9934190482eaa7f45e6ad9611bd61d9
 
x86_64:
rh-mysql56-mysql-5.6.30-1.el6.x86_64.rpm
    MD5: fa5f7e042358ceab1b9b0b3360548f87SHA-256: 8fe840799d8be3eeec078586e1df2a642c88c24ac2ebaadc3da6b545e3aac572
rh-mysql56-mysql-bench-5.6.30-1.el6.x86_64.rpm
    MD5: 6d393cd84ab31d9e46c612ab9b8c9288SHA-256: a92c7ad63a18ca96f003a68e2a2aeb79017e684545cdfc26b702a139c1101c1c
rh-mysql56-mysql-common-5.6.30-1.el6.x86_64.rpm
    MD5: fe8c220183041cf74164776c3833700aSHA-256: bf80e49cfd741deffba3fd669d4790671c85c40f2a880347d0d4a87edd4ebe6a
rh-mysql56-mysql-config-5.6.30-1.el6.x86_64.rpm
    MD5: ebf5d7fcc54c2a32459115d9b67f82ebSHA-256: d7ebd043140f6f0172b5cea07b7a65b9627216b6a2305713a2b5de7dabc7cf8a
rh-mysql56-mysql-debuginfo-5.6.30-1.el6.x86_64.rpm
    MD5: ed4dd522d010d014c13bf7d7ffdd9002SHA-256: 3f41e7ad6bbb440bdfbb572930e9efcccec3aef67902e482619e0bd69b99bf41
rh-mysql56-mysql-devel-5.6.30-1.el6.x86_64.rpm
    MD5: 9745b8e550c9888373ee958fde3f2493SHA-256: dcd7a2e16125766013f64a9ed8ed65488111b99714334dd72f09902ba0ff6423
rh-mysql56-mysql-errmsg-5.6.30-1.el6.x86_64.rpm
    MD5: 5a7fbf660265da1bb55190d8299f1d2eSHA-256: 167db815612a3250b1561a22d5ad777f9b1cff3faa72d7a40dd8a34c194cdc41
rh-mysql56-mysql-server-5.6.30-1.el6.x86_64.rpm
    MD5: 1ff8b6a7f9f529ba7a8146bf0ed3f873SHA-256: 4d65f809c795d456f289e253fba6f0fcb57bf49364b26e5d410f73fd4b4a0ff9
rh-mysql56-mysql-test-5.6.30-1.el6.x86_64.rpm
    MD5: 5817862a2050f2ab236bcc6591a366cbSHA-256: e9ef5332186a7cd49fe45840b7c021b37490974425f5e62da229db5927dcb715
 
Red Hat Software Collections 1 for RHEL 7

SRPMS:
rh-mysql56-mysql-5.6.30-1.el7.src.rpm
    MD5: 043327eb8cbad1ea6ae499282b2f9417SHA-256: 69feeb0c6d1e81946635c23a6f847e6fe2aef9688eede43de2e6f0b84814b083
 
x86_64:
rh-mysql56-mysql-5.6.30-1.el7.x86_64.rpm
    MD5: c76176d5043e1512cc7b3d146b3752f6SHA-256: 6060c465feafc13836bf6e568271cbc6a4cfe9dabba14e14d801fac5118f4063
rh-mysql56-mysql-bench-5.6.30-1.el7.x86_64.rpm
    MD5: e9482938210b285f3a900e8de15ac97dSHA-256: a14a482072600cecf9ae263eacef70df13380dfb3e5ca24cd184abd5884c3b49
rh-mysql56-mysql-common-5.6.30-1.el7.x86_64.rpm
    MD5: 29c9303dd572eb9d0bf7ed53296842bcSHA-256: 445ad91bafd51e572a1df3033c495479d8d3978a6a7e0295a5c241d3aee8a440
rh-mysql56-mysql-config-5.6.30-1.el7.x86_64.rpm
    MD5: 48eb0550dc666275ec7cf0c2bfb6c773SHA-256: 5206a6a65f9e0e6c4ccf953d688ba875f4fc7a56488c533e19deeabfc202a4e5
rh-mysql56-mysql-debuginfo-5.6.30-1.el7.x86_64.rpm
    MD5: 410918d1856f4f4cc60b891ea55e04beSHA-256: 90d3692e153b8877ee51c20d60d47ade5c24dcee9460c43643724ce27c59a551
rh-mysql56-mysql-devel-5.6.30-1.el7.x86_64.rpm
    MD5: df9743cfc684bf15e9c90f4682954524SHA-256: 661fbf7eea1f4aa6ed1091858d23bddf0b90849a18ba843fd47162597e71324b
rh-mysql56-mysql-errmsg-5.6.30-1.el7.x86_64.rpm
    MD5: a7370d4e843e309b2151d5e9ee772aabSHA-256: 133a181d9bf28a70094b60bb0721a587a8d85a054e4b7894d7e67905010ac417
rh-mysql56-mysql-server-5.6.30-1.el7.x86_64.rpm
    MD5: aac24dfd0887343d981505f70049d58bSHA-256: 13baab54df4d49d8c67e3095839df663a00bec08758859e99d29938487b34ae4
rh-mysql56-mysql-test-5.6.30-1.el7.x86_64.rpm
    MD5: 264e06f7c74271cf472a8377d33fd9c4SHA-256: eb731e6f9b9a56c5f606b0403171e73c1e2a3fdbed14b96b8acce95d0f66a826
 
(The unlinked packages above are only available from the Red Hat Network)
1274752 – CVE-2015-4792 mysql: unspecified vulnerability related to Server:Partition (CPU October 2015)1274754 – CVE-2015-4800 mysql: unspecified vulnerability related to Server:Optimizer (CPU October 2015)1274756 – CVE-2015-4802 mysql: unspecified vulnerability related to Server:Partition (CPU October 2015)1274759 – CVE-2015-4815 mysql: unspecified vulnerability related to Server:DDL (CPU October 2015)1274766 – CVE-2015-4826 mysql: unspecified vulnerability related to Server:Types (CPU October 2015)1274767 – CVE-2015-4830 mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015)1274771 – CVE-2015-4836 mysql: unspecified vulnerability related to Server:SP (CPU October 2015)1274773 – CVE-2015-4858 mysql: unspecified vulnerability related to Server:DML (CPU October 2015)1274776 – CVE-2015-4861 mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015)1274778 – CVE-2015-4862 mysql: unspecified vulnerability related to Server:DML (CPU October 2015)1274781 – CVE-2015-4870 mysql: unspecified vulnerability related to Server:Parser (CPU October 2015)1274785 – CVE-2015-4890 mysql: unspecified vulnerability related to Server:Replication (CPU October 2015)1274792 – CVE-2015-4910 mysql: unspecified vulnerability related to Server:Memcached (CPU October 2015)1274794 – CVE-2015-4913 mysql: unspecified vulnerability related to Server:DML (CPU October 2015)1301490 – CVE-2016-0503 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016)1301491 – CVE-2016-0504 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016)1301492 – CVE-2016-0505 mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016)1301493 – CVE-2016-0546 mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016)1301495 – CVE-2016-0595 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016)1301496 – CVE-2016-0596 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016)1301497 – CVE-2016-0597 mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016)1301498 – CVE-2016-0598 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016)1301501 – CVE-2016-0600 mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016)1301503 – CVE-2016-0605 mysql: unspecified vulnerability in subcomponent: Server: General (CPU January 2016)1301504 – CVE-2016-0606 mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016)1301505 – CVE-2016-0607 mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU January 2016)1301506 – CVE-2016-0608 mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016)1301507 – CVE-2016-0609 mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016)1301508 – CVE-2016-0610 mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016)1301509 – CVE-2016-0611 mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016)1301874 – CVE-2016-2047 mysql: ssl-validate-cert incorrect hostname check1329238 – CVE-2016-0639 mysql: unspecified vulnerability in subcomponent: Server: Pluggable Authentication (CPU April 2016)1329239 – CVE-2016-0640 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016)1329241 – CVE-2016-0641 mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016)1329243 – CVE-2016-0642 mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016)1329245 – CVE-2016-0643 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016)1329247 – CVE-2016-0644 mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016)1329248 – CVE-2016-0646 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016)1329249 – CVE-2016-0647 mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016)1329251 – CVE-2016-0648 mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016)1329252 – CVE-2016-0649 mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016)1329253 – CVE-2016-0650 mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016)1329259 – CVE-2016-0655 mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU April 2016)1329266 – CVE-2016-0661 mysql: unspecified vulnerability in subcomponent: Server: Options (CPU April 2016)1329269 – CVE-2016-0665 mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU April 2016)1329270 – CVE-2016-0666 mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016)1329273 – CVE-2016-0668 mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU April 2016)

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from: