Release date:
2025-03-01 10:06:22 UTC
Description:
- Update to MySQL 8.0.41
- CVEs fixed:
CVE-2024-5535 CVE-2024-7264 CVE-2024-11053 CVE-2024-21193 CVE-2024-21194
CVE-2024-21196 CVE-2024-21197 CVE-2024-21198 CVE-2024-21199 CVE-2024-21201
CVE-2024-21203 CVE-2024-21212 CVE-2024-21213 CVE-2024-21218 CVE-2024-21219
CVE-2024-21230 CVE-2024-21231 CVE-2024-21236 CVE-2024-21237 CVE-2024-21238
CVE-2024-21239 CVE-2024-21241 CVE-2024-21247 CVE-2024-37371 CVE-2025-21490
CVE-2025-21491 CVE-2025-21494 CVE-2025-21497 CVE-2025-21500 CVE-2025-21501
CVE-2025-21503 CVE-2025-21504 CVE-2025-21505 CVE-2025-21518 CVE-2025-21519
CVE-2025-21520 CVE-2025-21521 CVE-2025-21522 CVE-2025-21523 CVE-2025-21525
CVE-2025-21529 CVE-2025-21531 CVE-2025-21534 CVE-2025-21536 CVE-2025-21540
CVE-2025-21543 CVE-2025-21546 CVE-2025-21555 CVE-2025-21559
- Rebase mysql-mtr.patch
- Remove mysql-fix-includes-robin-hood.patch
- Rebase mysql-increase-wait-until-connect-timeout.patch
Updated packages:
-
mysql-8.0.41-1.module_el8.4.0+2262+68960773.tuxcare.els1.x86_64.rpm
sha:c564bdf1c3e61365efa60994649f55d97f3c6b2ade537b36ee40aa5daa5be9da
-
mysql-common-8.0.41-1.module_el8.4.0+2262+68960773.tuxcare.els1.x86_64.rpm
sha:294900297975177fa8cc59d007ef8e307feae640cb83c69f59438768d5eeaf17
-
mysql-devel-8.0.41-1.module_el8.4.0+2262+68960773.tuxcare.els1.x86_64.rpm
sha:544d7e1cdc4d8352256a1c471427ec25f154d2a4fcf10fde65025af18266ba25
-
mysql-errmsg-8.0.41-1.module_el8.4.0+2262+68960773.tuxcare.els1.x86_64.rpm
sha:a747e1e139bab14e057bb9665021a94054194021d0747e6fe476922b46fb0577
-
mysql-libs-8.0.41-1.module_el8.4.0+2262+68960773.tuxcare.els1.x86_64.rpm
sha:79468642670eb18841d749ac18197faf8dc67d75c946c8a5fad8484cadb78f87
-
mysql-server-8.0.41-1.module_el8.4.0+2262+68960773.tuxcare.els1.x86_64.rpm
sha:38f8230da19f0399dd83d35ed60120feaa88bb43dd15f2cffaba958c4b20326a
-
mysql-test-8.0.41-1.module_el8.4.0+2262+68960773.tuxcare.els1.x86_64.rpm
sha:16315639c384416986a6c75c8838480a125602d28ad1d52c0e12ee5e6613efed
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.