Skip to main content
NetApp Knowledge Base

MySQL vulnerability on SnapCenter 5.0 or lower (Oracle MySQL Server October 2024 Critical Patch Update)

Views:
190
Visibility:
Public
Votes:
0
Category:
snapcenter
Specialty:
snapx
Last Updated:

Applies to

  • SnapCenter server 5.0 or lower
  • MySQL Server versions 8.0.39 and prior
  • MySQL Server versions 8.4.2 and prior
  • MySQL Server versions 9.0.1 and prior

Issue

Vulnerability observed on Oracle MySQL Server October 2024 Critical Patch Update

This Critical Patch Update contains patches for  8.0.x and 8.x.y oracle MySQL server

Affected Versions:
MySQL Server versions 8.0.39 and prior
MySQL Server versions 8.4.2 and prior
MySQL Server versions 9.0.1 and prior

Related CVE-IDs:

CVE-2024-5535, CVE-2024-7264, CVE-2024-21193, CVE-2024-21194, CVE-2024-21196, CVE-2024-21197, CVE-2024-21198, CVE-2024-21199, CVE-2024-21201, CVE-2024-21203, CVE-2024-21213, CVE-2024-21218, CVE-2024-21219, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-21237, CVE-2024-21238, CVE-2024-21239, CVE-2024-21241, CVE-2024-21247, CVE-2024-21200, CVE-2024-21204, CVE-2024-21207, CVE-2024-21212, CVE-2024-21209, CVE-2024-21232, CVE-2024-21243, CVE-2024-21244

 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.