[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1YjiJa-0006oC-I0@master.debian.org>
Date: Sun, 19 Apr 2015 06:02:46 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3229-1] mysql-5.5 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3229-1 security@...ian.org
http://www.debian.org/security/ Salvatore Bonaccorso
April 19, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mysql-5.5
CVE ID : CVE-2015-0433 CVE-2015-0441 CVE-2015-0499 CVE-2015-0501
CVE-2015-0505 CVE-2015-2568 CVE-2015-2571 CVE-2015-2573
Debian Bug : 782645
Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.43. Please see the MySQL 5.5 Release Notes and Oracle's
Critical Patch Update advisory for further details:
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-42.html
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-43.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
For the stable distribution (wheezy), these problems have been fixed in
version 5.5.43-0+deb7u1.
For the upcoming stable distribution (jessie), these problems will be
fixed in version 5.5.43-0+deb8u1. Updated packages are already available
through jessie-security.
We recommend that you upgrade your mysql-5.5 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=npaa
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists