Security update for mariadb

Announcement ID: SUSE-SU-2016:1619-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2016-0640 ( NVD ): 6.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2016-0641 ( NVD ): 5.1 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  • CVE-2016-0642 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  • CVE-2016-0642 ( NVD ): 4.7 CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  • CVE-2016-0643 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2016-0644 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0646 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0647 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0648 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0649 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0650 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0651 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0651 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0655 ( NVD ): 4.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0666 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0668 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-0668 ( NVD ): 4.1 CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2016-2047 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
  • SUSE Linux Enterprise Desktop 12
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server for SAP Applications 12
  • SUSE Linux Enterprise Software Development Kit 12
  • SUSE Linux Enterprise Workstation Extension 12

An update that solves 25 vulnerabilities can now be installed.

Description:

mariadb was updated to version 10.0.25 to fix 25 security issues.

These security issues were fixed: - CVE-2016-0505: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Options (bsc#980904). - CVE-2016-0546: Unspecified vulnerability allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Client (bsc#980904). - CVE-2016-0596: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0597: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904). - CVE-2016-0598: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0600: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to InnoDB (bsc#980904). - CVE-2016-0606: Unspecified vulnerability allowed remote authenticated users to affect integrity via unknown vectors related to encryption (bsc#980904). - CVE-2016-0608: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to UDF (bsc#980904). - CVE-2016-0609: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to privileges (bsc#980904). - CVE-2016-0616: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904). - CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#980904). - CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#980904). - CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#980904). - CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#980904). - CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#980904). - CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#980904). - CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904). - CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904). - CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#980904). - CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#980904). - CVE-2016-0655: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904). - CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#980904). - CVE-2016-0668: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904). - CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com (bsc#963806).

These non-security issues were fixed: - bsc#960961: Use 'plugin-load-add' instead of 'plugin-load' in default_plugins.cnf. It contained 'plugin-load' options which caused that only last plugin was actually loaded ('plugin-load' overrides the previous 'plugin-load') - bsc#961935: Remove the leftovers of "openSUSE" string in the '-DWITH_COMMENT' and 'DCOMPILATION_COMMENT' options

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Desktop 12
    zypper in -t patch SUSE-SLE-DESKTOP-12-2016-964=1
  • SUSE Linux Enterprise Software Development Kit 12
    zypper in -t patch SUSE-SLE-SDK-12-2016-964=1
  • SUSE Linux Enterprise Server 12
    zypper in -t patch SUSE-SLE-SERVER-12-2016-964=1
  • SUSE Linux Enterprise Server for SAP Applications 12
    zypper in -t patch SUSE-SLE-SERVER-12-2016-964=1
  • SUSE Linux Enterprise Workstation Extension 12
    zypper in -t patch SUSE-SLE-WE-12-2016-964=1

Package List:

  • SUSE Linux Enterprise Desktop 12 (x86_64)
    • mariadb-client-10.0.25-20.6.1
    • mariadb-errormessages-10.0.25-20.6.1
    • libmysqlclient18-32bit-10.0.25-20.6.1
    • mariadb-debuginfo-10.0.25-20.6.1
    • libmysqlclient18-debuginfo-32bit-10.0.25-20.6.1
    • mariadb-10.0.25-20.6.1
    • libmysqlclient18-10.0.25-20.6.1
    • mariadb-client-debuginfo-10.0.25-20.6.1
    • libmysqlclient18-debuginfo-10.0.25-20.6.1
    • mariadb-debugsource-10.0.25-20.6.1
    • libmysqlclient_r18-10.0.25-20.6.1
    • libmysqlclient_r18-32bit-10.0.25-20.6.1
  • SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64)
    • mariadb-debuginfo-10.0.25-20.6.1
    • libmysqld-devel-10.0.25-20.6.1
    • libmysqlclient-devel-10.0.25-20.6.1
    • libmysqld18-10.0.25-20.6.1
    • libmysqld18-debuginfo-10.0.25-20.6.1
    • mariadb-debugsource-10.0.25-20.6.1
    • libmysqlclient_r18-10.0.25-20.6.1
  • SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64)
    • mariadb-client-10.0.25-20.6.1
    • mariadb-errormessages-10.0.25-20.6.1
    • mariadb-debuginfo-10.0.25-20.6.1
    • mariadb-tools-debuginfo-10.0.25-20.6.1
    • mariadb-10.0.25-20.6.1
    • libmysqlclient18-10.0.25-20.6.1
    • mariadb-client-debuginfo-10.0.25-20.6.1
    • libmysqlclient18-debuginfo-10.0.25-20.6.1
    • mariadb-debugsource-10.0.25-20.6.1
    • mariadb-tools-10.0.25-20.6.1
  • SUSE Linux Enterprise Server 12 (s390x x86_64)
    • libmysqlclient18-32bit-10.0.25-20.6.1
    • libmysqlclient18-debuginfo-32bit-10.0.25-20.6.1
  • SUSE Linux Enterprise Server for SAP Applications 12 (x86_64)
    • mariadb-client-10.0.25-20.6.1
    • mariadb-errormessages-10.0.25-20.6.1
    • libmysqlclient18-32bit-10.0.25-20.6.1
    • mariadb-debuginfo-10.0.25-20.6.1
    • mariadb-tools-debuginfo-10.0.25-20.6.1
    • mariadb-10.0.25-20.6.1
    • libmysqlclient18-10.0.25-20.6.1
    • mariadb-client-debuginfo-10.0.25-20.6.1
    • libmysqlclient18-debuginfo-10.0.25-20.6.1
    • mariadb-debugsource-10.0.25-20.6.1
    • libmysqlclient18-debuginfo-32bit-10.0.25-20.6.1
    • mariadb-tools-10.0.25-20.6.1
  • SUSE Linux Enterprise Workstation Extension 12 (x86_64)
    • libmysqlclient_r18-10.0.25-20.6.1
    • mariadb-debuginfo-10.0.25-20.6.1
    • libmysqlclient_r18-32bit-10.0.25-20.6.1
    • mariadb-debugsource-10.0.25-20.6.1

References: