lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 31 Oct 2015 08:23:38 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3385-1] mariadb-10.0 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3385-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
October 31, 2015                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mariadb-10.0
CVE ID         : CVE-2015-4792 CVE-2015-4802 CVE-2015-4815 CVE-2015-4816
                 CVE-2015-4819 CVE-2015-4826 CVE-2015-4830 CVE-2015-4836
                 CVE-2015-4858 CVE-2015-4861 CVE-2015-4870 CVE-2015-4879
                 CVE-2015-4895 CVE-2015-4913
Debian Bug     : 802874

Several issues have been discovered in the MariaDB database server. The
vulnerabilities are addressed by upgrading MariaDB to the new upstream
version 10.0.22. Please see the MariaDB 10.0 Release Notes for further
details:

 https://mariadb.com/kb/en/mariadb/mariadb-10021-release-notes/
 https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/

For the stable distribution (jessie), these problems have been fixed in
version 10.0.22-0+deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 10.0.22-1 or earlier.

We recommend that you upgrade your mariadb-10.0 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJWNHiiAAoJEAVMuPMTQ89EZPYP/RXpOeexYDO8fVmrsaHrfGr/
AlJow4CASc7pRIAlpzyCJYwtNx/EWZ+B7LjCDSywoMTcb71JAYs3/ZkRf0zFQect
zTu+tGU346+OFQ4oVrC7nD7YBr2ufqbIfwH+r0aWhwunVtFz8QRka6b8qkjF7zdp
nkIIjJCuexvMeEfAtnoipsaIC8J2PHqXUVDJJuRlOLdZHfDdNcX6LHE5NBj6vdlN
yOiYuSoB5RIM3NWeQSr817hUjIQ5maHE914dqyTzJ/H6hUcDM29hh6QRiOHw2I84
KNV7lECnsBlMJiv2AQcvdBTLdxfb8wSyaNrdzM4MZbbUBX/CbGwo14YI74yllLfm
KLmvrlHVgF7UEjECTbG+vz0FL7I1Jx4tz+xAT/1v8STUONjyBpzkwfTuyQiDasBg
C0ZfnPIWphpSHzaahpAWrn8lWvE3/zKD9Yp8ayw2iTOtCHsmGrszMmLORKdyM04g
RsVY+ppVIz2buN8qd9zPk2j1yE9C0GITPj8+gS0YdzFLgWIAbQ9Vx8adzl3PfnTH
MgWaaNBbIYYrnH9n8c/BRzN6OL8iXu+IjZpvBoAP/sBhzOGSISGkdGgfUAP8s5Df
1GM+m5+5QR14cFqBEaZvA2JDhYmMQGtMSnpKy9DpNMhbIHC7ZLa8GexiOYjXGQQH
MxamLc9qvdnNQXd2usnu
=BdYx
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ