lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 07 Mar 2012 21:44:22 +0100
From: Florian Weimer <fw@...eb.enyo.de>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2429-1] mysql-5.1 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2429-1                   security@...ian.org
http://www.debian.org/security/                            Florian Weimer
March 07, 2012                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mysql-5.1
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2011-2262 CVE-2012-0075 CVE-2012-0087 CVE-2012-0101
    	         CVE-2012-0102 CVE-2012-0112 CVE-2012-0113 CVE-2012-0114
		 CVE-2012-0115 CVE-2012-0116 CVE-2012-0118 CVE-2012-0119
		 CVE-2012-0120 CVE-2012-0484 CVE-2012-0485 CVE-2012-0490
		 CVE-2012-0492
Debian Bug     : 659687

Several security vulnerabilities were discovered in MySQL, a database
management system.  The vulnerabilities are addressed by upgrading
MySQL to a new upstream version, 5.1.61, which includes additional
changes, such as performance improvements and corrections for data
loss defects.  These changes are described in the MySQL release notes
at: http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html

For the stable distribution (squeeze), these problems have been fixed
in version 5.1.61-0+squeeze1.

For the unstable distribution (sid), these problems have been fixed in
version 5.1.61-2.

We recommend that you upgrade your mysql-5.1 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJPV8DTAAoJEL97/wQC1SS+L24H/15Ovi05XFuAcy4dQpLfOWr4
3pjA6p03aaWBKeqW0DoQ+768MoShxjKiSA2ERXByX0AiKUXxLu6YG5sNohiOjOEP
NqO84Jq+gmpiQdiWhMqOsEj61JEXvncRtKvo8N6QnJ9j+y+MR2ja2KjNtEeGyUr1
yc8ubMgS7mbqxZKK3+cStZwChRPy8p6f+/nplHfyL9AgCkJDjTjNhoZrZ21aSfeu
eC6zzvWAiFWkHxNqM+HQBURPedbyEIJDNf25fMkMIzuqeLDfIoC3ATwpZHCE2mxq
fLRH7Bp4cpHNBAjDpwuOqkYuAduj1fL5+oBmw/zkpHBp5oHrBpnTZ2zULJ062Tg=
=mr98
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ