Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.5
MySQL 8.4 Security Update Fixes Critical Flaw on Red Hat Systems
RHSA-2026:4162
Summary
A critical security issue in MySQL 8.4 on Red Hat systems could allow an attacker to execute arbitrary code on your server. This update from Red Hat fixes the issue, so it's essential to apply the patch to prevent potential data breaches. If you're using MySQL 8.4 on a Red Hat system, update your database software as soon as possible.
What to do
- Update redhat mysql8.4 to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-common to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-debuginfo to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-debugsource to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-devel to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-devel-debuginfo to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-errmsg to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-libs to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-libs-debuginfo to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-server to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-server-debuginfo to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-test to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-test-data to version 0:8.4.8-1.el10_1.
- Update redhat mysql8.4-test-debuginfo to version 0:8.4.8-1.el10_1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | mysql8.4 | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-common | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-debuginfo | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-debugsource | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-devel | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-devel-debuginfo | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-errmsg | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-libs | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-libs-debuginfo | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-server | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-server-debuginfo | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-test | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-test-data | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
| redhat | mysql8.4-test-debuginfo | <= 0:8.4.8-1.el10_1 | 0:8.4.8-1.el10_1 |
Original title
Red Hat Security Advisory: mysql8.4 security update
osv CVSS3.1
6.5
- https://access.redhat.com/errata/RHSA-2026:4162 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#moderate Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2431384 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2431385 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2431402 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2431409 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2431413 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2431431 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4162.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-21936 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-21936 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21936 Vendor Advisory
- https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-21937 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-21937 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21937 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-21941 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-21941 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21941 Vendor Advisory
- https://www.oracle.com/security-alerts/cpujan2026.html Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-21948 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-21948 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21948 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-21964 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-21964 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21964 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-21968 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-21968 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21968 Vendor Advisory
Published: 10 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026