Gentoo Archives: gentoo-announce

From: Mikle Kolyada <zlogene@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201507-19 ] MySQL: Multiple vulnerabilities
Date: Fri, 10 Jul 2015 13:28:51
Message-Id: 559FC7AF.6090407@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201507-19
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: MySQL: Multiple vulnerabilities
9 Date: July 10, 2015
10 Bugs: #546722
11 ID: 201507-19
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in MySQL, allowing attackers
19 to execute arbitrary code or cause Denial of Service.
20
21 Background
22 ==========
23
24 MySQL is a fast, multi-threaded, multi-user SQL database server.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 dev-db/mysql < 5.6.24 *>= 5.5.43
33 >= 5.6.24
34
35 Description
36 ===========
37
38 Multiple vulnerabilities have been discovered in MySQL. Please review
39 the CVE identifiers referenced below for details.
40
41 Impact
42 ======
43
44 A remote attacker could send a specially crafted request, possibly
45 resulting in execution of arbitrary code with the privileges of the
46 application or a Denial of Service condition.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All MySQL 5.5.x users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.5.43"
60
61 All MySQL 5.6.x users should upgrade to the latest version:
62
63 # emerge --sync
64 # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.6.24"
65
66 References
67 ==========
68
69 [ 1 ] CVE-2015-0405
70 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0405
71 [ 2 ] CVE-2015-0423
72 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0423
73 [ 3 ] CVE-2015-0433
74 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0433
75 [ 4 ] CVE-2015-0438
76 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0438
77 [ 5 ] CVE-2015-0439
78 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0439
79 [ 6 ] CVE-2015-0441
80 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0441
81 [ 7 ] CVE-2015-0498
82 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0498
83 [ 8 ] CVE-2015-0499
84 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0499
85 [ 9 ] CVE-2015-0500
86 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0500
87 [ 10 ] CVE-2015-0501
88 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0501
89 [ 11 ] CVE-2015-0503
90 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0503
91 [ 12 ] CVE-2015-0505
92 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0505
93 [ 13 ] CVE-2015-0506
94 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0506
95 [ 14 ] CVE-2015-0507
96 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0507
97 [ 15 ] CVE-2015-0508
98 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0508
99 [ 16 ] CVE-2015-0511
100 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0511
101 [ 17 ] CVE-2015-2566
102 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2566
103 [ 18 ] CVE-2015-2567
104 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2567
105 [ 19 ] CVE-2015-2568
106 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2568
107 [ 20 ] CVE-2015-2571
108 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2571
109 [ 21 ] CVE-2015-2573
110 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2573
111
112 Availability
113 ============
114
115 This GLSA and any updates to it are available for viewing at
116 the Gentoo Security Website:
117
118 https://security.gentoo.org/glsa/201507-19
119
120 Concerns?
121 =========
122
123 Security is a primary focus of Gentoo Linux and ensuring the
124 confidentiality and security of our users' machines is of utmost
125 importance to us. Any security concerns should be addressed to
126 security@g.o or alternatively, you may file a bug at
127 https://bugs.gentoo.org.
128
129 License
130 =======
131
132 Copyright 2015 Gentoo Foundation, Inc; referenced text
133 belongs to its owner(s).
134
135 The contents of this document are licensed under the
136 Creative Commons - Attribution / Share Alike license.
137
138 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature