Security update for mysql
Announcement ID: | SUSE-SU-2016:1279-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 13 vulnerabilities can now be installed.
Description:
mysql was updated to version 5.5.49 to fix 13 security issues.
These security issues were fixed: - CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#976341). - CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#976341). - CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#976341). - CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#976341). - CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#976341). - CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#976341). - CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#976341). - CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#976341). - CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#976341). - CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#976341). - CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341). - CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341). - CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com (bsc#963806).
More details are available at - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 11 SP4
zypper in -t patch sdksp4-mysql-12554=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-mysql-12554=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-mysql-12554=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (ia64)
- libmysql55client_r18-x86-5.5.49-0.20.1
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (ppc64 s390x x86_64)
- libmysql55client_r18-32bit-5.5.49-0.20.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- libmysql55client18-5.5.49-0.20.1
- libmysql55client_r18-5.5.49-0.20.1
- mysql-client-5.5.49-0.20.1
- mysql-tools-5.5.49-0.20.1
- mysql-5.5.49-0.20.1
-
SUSE Linux Enterprise Server 11 SP4 (ia64)
- libmysql55client18-x86-5.5.49-0.20.1
- libmysql55client_r18-x86-5.5.49-0.20.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64)
- libmysql55client18-32bit-5.5.49-0.20.1
- libmysql55client_r18-32bit-5.5.49-0.20.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- libmysql55client18-32bit-5.5.49-0.20.1
- libmysql55client18-5.5.49-0.20.1
- libmysql55client_r18-5.5.49-0.20.1
- mysql-client-5.5.49-0.20.1
- mysql-tools-5.5.49-0.20.1
- mysql-5.5.49-0.20.1
- libmysql55client_r18-32bit-5.5.49-0.20.1
References:
- https://www.suse.com/security/cve/CVE-2016-0640.html
- https://www.suse.com/security/cve/CVE-2016-0641.html
- https://www.suse.com/security/cve/CVE-2016-0642.html
- https://www.suse.com/security/cve/CVE-2016-0643.html
- https://www.suse.com/security/cve/CVE-2016-0644.html
- https://www.suse.com/security/cve/CVE-2016-0646.html
- https://www.suse.com/security/cve/CVE-2016-0647.html
- https://www.suse.com/security/cve/CVE-2016-0648.html
- https://www.suse.com/security/cve/CVE-2016-0649.html
- https://www.suse.com/security/cve/CVE-2016-0650.html
- https://www.suse.com/security/cve/CVE-2016-0651.html
- https://www.suse.com/security/cve/CVE-2016-0666.html
- https://www.suse.com/security/cve/CVE-2016-2047.html
- https://bugzilla.suse.com/show_bug.cgi?id=963806
- https://bugzilla.suse.com/show_bug.cgi?id=976341