Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in MySQL
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in MySQL
ID: SUSE-SU-2016:1279-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Software Development Kit 11-SP4, SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP4
Datum: Mi, 11. Mai 2016, 18:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0651
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648

Originalnachricht

   SUSE Security Update: Security update for mysql
______________________________________________________________________________

Announcement ID: SUSE-SU-2016:1279-1
Rating: important
References: #963806 #976341
Cross-References: CVE-2016-0640 CVE-2016-0641 CVE-2016-0642
CVE-2016-0643 CVE-2016-0644 CVE-2016-0646
CVE-2016-0647 CVE-2016-0648 CVE-2016-0649
CVE-2016-0650 CVE-2016-0651 CVE-2016-0666
CVE-2016-2047
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

An update that fixes 13 vulnerabilities is now available.

Description:

mysql was updated to version 5.5.49 to fix 13 security issues.

These security issues were fixed:
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect
availability via vectors related to DDL (bsc#976341).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect
availability via vectors related to DML (bsc#976341).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect
availability via vectors related to FTS (bsc#976341).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect
integrity and availability via vectors related to DML (bsc#976341).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect
confidentiality and availability via vectors related to MyISAM
(bsc#976341).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect
integrity and availability via vectors related to Federated (bsc#976341).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect
confidentiality via vectors related to DML (bsc#976341).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect
availability via vectors related to Security: Privileges (bsc#976341).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect
availability via vectors related to Optimizer (bsc#976341).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect
availability via vectors related to Replication (bsc#976341).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect
availability via vectors related to PS (bsc#976341).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect
availability via vectors related to PS (bsc#976341).
- CVE-2016-2047: The ssl_verify_server_cert function in
sql-common/client.c did not properly verify that the server hostname
matches a domain name in the subject's Common Name (CN) or
subjectAltName field of the X.509 certificate, which allowed
man-in-the-middle attackers to spoof SSL servers via a "/CN="
string in
a field in a certificate, as demonstrated by
"/OU=/CN=bar.com/CN=foo.com
(bsc#963806).

More details are available at
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11-SP4:

zypper in -t patch sdksp4-mysql-12554=1

- SUSE Linux Enterprise Server 11-SP4:

zypper in -t patch slessp4-mysql-12554=1

- SUSE Linux Enterprise Debuginfo 11-SP4:

zypper in -t patch dbgsp4-mysql-12554=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x
x86_64):

libmysql55client_r18-32bit-5.5.49-0.20.1

- SUSE Linux Enterprise Software Development Kit 11-SP4 (ia64):

libmysql55client_r18-x86-5.5.49-0.20.1

- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

libmysql55client18-5.5.49-0.20.1
libmysql55client_r18-5.5.49-0.20.1
mysql-5.5.49-0.20.1
mysql-client-5.5.49-0.20.1
mysql-tools-5.5.49-0.20.1

- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

libmysql55client18-32bit-5.5.49-0.20.1
libmysql55client_r18-32bit-5.5.49-0.20.1

- SUSE Linux Enterprise Server 11-SP4 (ia64):

libmysql55client18-x86-5.5.49-0.20.1
libmysql55client_r18-x86-5.5.49-0.20.1

- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

mysql-debuginfo-5.5.49-0.20.1
mysql-debugsource-5.5.49-0.20.1


References:

https://www.suse.com/security/cve/CVE-2016-0640.html
https://www.suse.com/security/cve/CVE-2016-0641.html
https://www.suse.com/security/cve/CVE-2016-0642.html
https://www.suse.com/security/cve/CVE-2016-0643.html
https://www.suse.com/security/cve/CVE-2016-0644.html
https://www.suse.com/security/cve/CVE-2016-0646.html
https://www.suse.com/security/cve/CVE-2016-0647.html
https://www.suse.com/security/cve/CVE-2016-0648.html
https://www.suse.com/security/cve/CVE-2016-0649.html
https://www.suse.com/security/cve/CVE-2016-0650.html
https://www.suse.com/security/cve/CVE-2016-0651.html
https://www.suse.com/security/cve/CVE-2016-0666.html
https://www.suse.com/security/cve/CVE-2016-2047.html
https://bugzilla.suse.com/963806
https://bugzilla.suse.com/976341

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung