Lucene search

K
suseSuseSUSE-SU-2016:1279-1
HistoryMay 11, 2016 - 6:10 p.m.

Security update for mysql (important)

2016-05-1118:10:17
lists.opensuse.org
17

0.003 Low

EPSS

Percentile

71.1%

mysql was updated to version 5.5.49 to fix 13 security issues.

These security issues were fixed:

  • CVE-2016-0644: Unspecified vulnerability allowed local users to affect
    availability via vectors related to DDL (bsc#976341).
  • CVE-2016-0646: Unspecified vulnerability allowed local users to affect
    availability via vectors related to DML (bsc#976341).
  • CVE-2016-0647: Unspecified vulnerability allowed local users to affect
    availability via vectors related to FTS (bsc#976341).
  • CVE-2016-0640: Unspecified vulnerability allowed local users to affect
    integrity and availability via vectors related to DML (bsc#976341).
  • CVE-2016-0641: Unspecified vulnerability allowed local users to affect
    confidentiality and availability via vectors related to MyISAM
    (bsc#976341).
  • CVE-2016-0642: Unspecified vulnerability allowed local users to affect
    integrity and availability via vectors related to Federated (bsc#976341).
  • CVE-2016-0643: Unspecified vulnerability allowed local users to affect
    confidentiality via vectors related to DML (bsc#976341).
  • CVE-2016-0666: Unspecified vulnerability allowed local users to affect
    availability via vectors related to Security: Privileges (bsc#976341).
  • CVE-2016-0651: Unspecified vulnerability allowed local users to affect
    availability via vectors related to Optimizer (bsc#976341).
  • CVE-2016-0650: Unspecified vulnerability allowed local users to affect
    availability via vectors related to Replication (bsc#976341).
  • CVE-2016-0648: Unspecified vulnerability allowed local users to affect
    availability via vectors related to PS (bsc#976341).
  • CVE-2016-0649: Unspecified vulnerability allowed local users to affect
    availability via vectors related to PS (bsc#976341).
  • CVE-2016-2047: The ssl_verify_server_cert function in
    sql-common/client.c did not properly verify that the server hostname
    matches a domain name in the subject’s Common Name (CN) or
    subjectAltName field of the X.509 certificate, which allowed
    man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in
    a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com
    (bsc#963806).

More details are available at