lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 19 Jan 2017 20:31:53 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3767-1] mysql-5.5 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3767-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 19, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mysql-5.5
CVE ID         : CVE-2017-3238 CVE-2017-3243 CVE-2017-3244 CVE-2017-3258 
                 CVE-2017-3265 CVE-2017-3291 CVE-2017-3312 CVE-2017-3313 
                 CVE-2017-3317 CVE-2017-3318
Debian Bug     : 851233

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.54, which includes additional changes, such as performance
improvements, bug fixes, new features, and possibly incompatible
changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
Patch Update advisory for further details:

 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
 http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html

For the stable distribution (jessie), these problems have been fixed in
version 5.5.54-0+deb8u1.

We recommend that you upgrade your mysql-5.5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=YePK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ