More information about these security flaws is available in the following bugs: http://bugzilla.redhat.com/show_bug.cgi?id=2188132 http://bugzilla.redhat.com/show_bug.cgi?id=2188122 http://bugzilla.redhat.com/show_bug.cgi?id=2188118 http://bugzilla.redhat.com/show_bug.cgi?id=2188127 http://bugzilla.redhat.com/show_bug.cgi?id=2188131 http://bugzilla.redhat.com/show_bug.cgi?id=2188120 http://bugzilla.redhat.com/show_bug.cgi?id=2188119 http://bugzilla.redhat.com/show_bug.cgi?id=2188121 http://bugzilla.redhat.com/show_bug.cgi?id=2188109 http://bugzilla.redhat.com/show_bug.cgi?id=2188130 http://bugzilla.redhat.com/show_bug.cgi?id=2188125 http://bugzilla.redhat.com/show_bug.cgi?id=2188115 http://bugzilla.redhat.com/show_bug.cgi?id=2188129 http://bugzilla.redhat.com/show_bug.cgi?id=2188124 http://bugzilla.redhat.com/show_bug.cgi?id=2188128 http://bugzilla.redhat.com/show_bug.cgi?id=2188117 http://bugzilla.redhat.com/show_bug.cgi?id=2188123 http://bugzilla.redhat.com/show_bug.cgi?id=2188116 http://bugzilla.redhat.com/show_bug.cgi?id=2188113 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. ===== # bugfix, security, enhancement, newpackage (required) type=security # low, medium, high, urgent (required) severity=medium # testing, stable request=testing # Bug numbers: 1234,9876 bugs=2188109,2188113,2188115,2188116,2188117,2188118,2188119,2188120,2188121,2188122,2188123,2188124,2188125,2188127,2188128,2188129,2188130,2188131,2188132,2196535 # Description of your update notes=Security fix for [PUT CVEs HERE] # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new
Fixed upstream in version 8.0.33.
Adding CVE-2023-22007, also fixed in 8.0.33, from Jul 2023 CPU: https://www.oracle.com/security-alerts/cpujul2023.html#AppendixMSQL
FEDORA-MODULAR-2023-8110bc5325 has been submitted as an update to Fedora 37 Modular. https://bodhi.fedoraproject.org/updates/FEDORA-MODULAR-2023-8110bc5325
FEDORA-MODULAR-2023-5b8a7bde59 has been submitted as an update to Fedora 38 Modular. https://bodhi.fedoraproject.org/updates/FEDORA-MODULAR-2023-5b8a7bde59
FEDORA-MODULAR-2023-8110bc5325 has been pushed to the Fedora 37 Modular testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-MODULAR-2023-8110bc5325 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-MODULAR-2023-5b8a7bde59 has been pushed to the Fedora 38 Modular testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-MODULAR-2023-5b8a7bde59 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-MODULAR-2023-8110bc5325 has been pushed to the Fedora 37 Modular stable repository. If problem still persists, please make note of it in this bug report.
FEDORA-MODULAR-2023-5b8a7bde59 has been pushed to the Fedora 38 Modular stable repository. If problem still persists, please make note of it in this bug report.
Adding CVE-2023-22104, also fixed in 8.0.33, from Oct 2023 CPU: https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixMSQL