Security update for mariadb
Announcement ID: | SUSE-SU-2016:1620-1 |
---|---|
Rating: | important |
References: | |
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 25 vulnerabilities can now be installed.
Description:
mariadb was updated to version 10.0.25 to fix 25 security issues.
These security issues were fixed: - CVE-2016-0505: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Options (bsc#980904). - CVE-2016-0546: Unspecified vulnerability allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Client (bsc#980904). - CVE-2016-0596: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0597: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904). - CVE-2016-0598: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0600: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to InnoDB (bsc#980904). - CVE-2016-0606: Unspecified vulnerability allowed remote authenticated users to affect integrity via unknown vectors related to encryption (bsc#980904). - CVE-2016-0608: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to UDF (bsc#980904). - CVE-2016-0609: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to privileges (bsc#980904). - CVE-2016-0616: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904). - CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#980904). - CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#980904). - CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#980904). - CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#980904). - CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#980904). - CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#980904). - CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904). - CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904). - CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#980904). - CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#980904). - CVE-2016-0655: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904). - CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#980904). - CVE-2016-0668: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904). - CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com (bsc#963806).
These non-security issues were fixed: - bsc#961935: Remove the leftovers of "openSUSE" string in the '-DWITH_COMMENT' and 'DCOMPILATION_COMMENT' options - bsc#970287: remove ha_tokudb.so plugin and tokuft_logprint and tokuftdump binaries as TokuDB storage engine requires the jemalloc library that isn't present in SLE-12-SP1 - bsc#970295: Fix the leftovers of "logrotate.d/mysql" string in the logrotate error message. Occurrences of this string were changed to "logrotate.d/mariadb" - bsc#963810: Add 'log-error' and 'secure-file-priv' configuration options * add '/etc/my.cnf.d/error_log.conf' that specifies 'log-error = /var/log/mysql/mysqld.log'. If no path is set, the error log is written to '/var/lib/mysql/$HOSTNAME.err', which is not picked up by logrotate. * add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that 'LOAD DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work with files in the directory specified by 'secure-file-priv' option (='/var/lib/mysql-files').
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12 SP1
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-963=1
-
SUSE Linux Enterprise Software Development Kit 12 SP1
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-963=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-963=1
-
SUSE Linux Enterprise Server 12 SP1
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-963=1
-
SUSE Linux Enterprise Workstation Extension 12 SP1
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-963=1
Package List:
-
SUSE Linux Enterprise Desktop 12 SP1 (x86_64)
- mariadb-debuginfo-10.0.25-6.1
- libmysqlclient18-debuginfo-10.0.25-6.1
- libmysqlclient18-debuginfo-32bit-10.0.25-6.1
- libmysqlclient_r18-10.0.25-6.1
- mariadb-client-debuginfo-10.0.25-6.1
- libmysqlclient_r18-32bit-10.0.25-6.1
- mariadb-client-10.0.25-6.1
- mariadb-errormessages-10.0.25-6.1
- mariadb-10.0.25-6.1
- mariadb-debugsource-10.0.25-6.1
- libmysqlclient18-10.0.25-6.1
- libmysqlclient18-32bit-10.0.25-6.1
-
SUSE Linux Enterprise Software Development Kit 12 SP1 (ppc64le s390x x86_64)
- mariadb-debuginfo-10.0.25-6.1
- libmysqlclient_r18-10.0.25-6.1
- libmysqlclient-devel-10.0.25-6.1
- libmysqld-devel-10.0.25-6.1
- mariadb-debugsource-10.0.25-6.1
- libmysqld18-10.0.25-6.1
- libmysqld18-debuginfo-10.0.25-6.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (ppc64le x86_64)
- mariadb-debuginfo-10.0.25-6.1
- libmysqlclient18-debuginfo-10.0.25-6.1
- mariadb-client-debuginfo-10.0.25-6.1
- mariadb-tools-debuginfo-10.0.25-6.1
- mariadb-tools-10.0.25-6.1
- mariadb-client-10.0.25-6.1
- mariadb-errormessages-10.0.25-6.1
- mariadb-10.0.25-6.1
- mariadb-debugsource-10.0.25-6.1
- libmysqlclient18-10.0.25-6.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (x86_64)
- libmysqlclient18-debuginfo-32bit-10.0.25-6.1
- libmysqlclient18-32bit-10.0.25-6.1
-
SUSE Linux Enterprise Server 12 SP1 (ppc64le s390x x86_64)
- mariadb-debuginfo-10.0.25-6.1
- libmysqlclient18-debuginfo-10.0.25-6.1
- mariadb-client-debuginfo-10.0.25-6.1
- mariadb-tools-debuginfo-10.0.25-6.1
- mariadb-tools-10.0.25-6.1
- mariadb-client-10.0.25-6.1
- mariadb-errormessages-10.0.25-6.1
- mariadb-10.0.25-6.1
- mariadb-debugsource-10.0.25-6.1
- libmysqlclient18-10.0.25-6.1
-
SUSE Linux Enterprise Server 12 SP1 (s390x x86_64)
- libmysqlclient18-debuginfo-32bit-10.0.25-6.1
- libmysqlclient18-32bit-10.0.25-6.1
-
SUSE Linux Enterprise Workstation Extension 12 SP1 (x86_64)
- libmysqlclient_r18-32bit-10.0.25-6.1
- mariadb-debuginfo-10.0.25-6.1
- mariadb-debugsource-10.0.25-6.1
- libmysqlclient_r18-10.0.25-6.1
References:
- https://www.suse.com/security/cve/CVE-2016-0505.html
- https://www.suse.com/security/cve/CVE-2016-0546.html
- https://www.suse.com/security/cve/CVE-2016-0596.html
- https://www.suse.com/security/cve/CVE-2016-0597.html
- https://www.suse.com/security/cve/CVE-2016-0598.html
- https://www.suse.com/security/cve/CVE-2016-0600.html
- https://www.suse.com/security/cve/CVE-2016-0606.html
- https://www.suse.com/security/cve/CVE-2016-0608.html
- https://www.suse.com/security/cve/CVE-2016-0609.html
- https://www.suse.com/security/cve/CVE-2016-0616.html
- https://www.suse.com/security/cve/CVE-2016-0640.html
- https://www.suse.com/security/cve/CVE-2016-0641.html
- https://www.suse.com/security/cve/CVE-2016-0642.html
- https://www.suse.com/security/cve/CVE-2016-0643.html
- https://www.suse.com/security/cve/CVE-2016-0644.html
- https://www.suse.com/security/cve/CVE-2016-0646.html
- https://www.suse.com/security/cve/CVE-2016-0647.html
- https://www.suse.com/security/cve/CVE-2016-0648.html
- https://www.suse.com/security/cve/CVE-2016-0649.html
- https://www.suse.com/security/cve/CVE-2016-0650.html
- https://www.suse.com/security/cve/CVE-2016-0651.html
- https://www.suse.com/security/cve/CVE-2016-0655.html
- https://www.suse.com/security/cve/CVE-2016-0666.html
- https://www.suse.com/security/cve/CVE-2016-0668.html
- https://www.suse.com/security/cve/CVE-2016-2047.html
- https://bugzilla.suse.com/show_bug.cgi?id=961935
- https://bugzilla.suse.com/show_bug.cgi?id=963806
- https://bugzilla.suse.com/show_bug.cgi?id=963810
- https://bugzilla.suse.com/show_bug.cgi?id=970287
- https://bugzilla.suse.com/show_bug.cgi?id=970295
- https://bugzilla.suse.com/show_bug.cgi?id=980904