Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.48 and earlier, 5.6.29 and earlier and 5.7.10 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. External References: http://www.oracle.com/technetwork/topics/security/cpujul2016-2881720.html
This was already corrected in the following updates, which rebased affected packages to fixed upstream versions. Red Hat Software Collections - rh-mysql56-mysql https://rhn.redhat.com/errata/RHSA-2016-0705.html Red Hat Software Collections - rh-mariadb100-mariadb https://rhn.redhat.com/errata/RHSA-2016-1132.html
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2016:1481 https://rhn.redhat.com/errata/RHSA-2016-1481.html
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2016:1480 https://rhn.redhat.com/errata/RHSA-2016-1480.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1602 https://rhn.redhat.com/errata/RHSA-2016-1602.html