[security-announce] SUSE-SU-2013:1390-1: important: Security update for MySQL

SUSE Security Update: Security update for MySQL ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:1390-1 Rating: important References: #734436 #768832 #780019 #789263 #791863 #803040 #830086 #834028 #834967 Cross-References: CVE-2013-1861 CVE-2013-3783 CVE-2013-3793 CVE-2013-3794 CVE-2013-3795 CVE-2013-3796 CVE-2013-3798 CVE-2013-3801 CVE-2013-3802 CVE-2013-3804 CVE-2013-3805 CVE-2013-3806 CVE-2013-3807 CVE-2013-3808 CVE-2013-3809 CVE-2013-3810 CVE-2013-3811 CVE-2013-3812 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. It includes one version update. Description: This version upgrade of mysql to 5.5.32 fixes multiple security issues: CVE-2013-1861, CVE-2013-3783, CVE-2013-3793, CVE-2013-3794, CVE-2013-3795, CVE-2013-3796, CVE-2013-3798, CVE-2013-3801, CVE-2013-3802, CVE-2013-3804, CVE-2013-3805, CVE-2013-3806, CVE-2013-3807, CVE-2013-3808, CVE-2013-3809, CVE-2013-3810, CVE-2013-3811, CVE-2013-3812 Additionally, it contains numerous bug fixes and improvements.: * making mysqldump work with MySQL 5.0 (bnc#768832) * fixed log rights (bnc#789263 and bnc#803040) * binlog disabled in default configuration (bnc#791863) * fixed dependencies for client package (bnc#780019) * minor polishing of spec/installation * avoiding file conflicts with mytop * better fix for hardcoded libdir issue * fix hardcoded plugin paths (bnc#834028) * Use chown --no-dereference instead of chown to improve security (bnc#834967) * Adjust to spell !includedir correctly in /etc/my.cnf (bnc#734436) Security Issue references: * CVE-2013-1861 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1861
* CVE-2013-3783 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3783
* CVE-2013-3793 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3793
* CVE-2013-3794 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3794
* CVE-2013-3795 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3795
* CVE-2013-3796 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3796
* CVE-2013-3798 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3798
* CVE-2013-3801 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3801
* CVE-2013-3802 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3802
* CVE-2013-3804 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3804
* CVE-2013-3805 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3805
* CVE-2013-3806 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3806
* CVE-2013-3807 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3807
* CVE-2013-3808 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3808
* CVE-2013-3809 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3809
* CVE-2013-3810 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3810
* CVE-2013-3811 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3811
* CVE-2013-3812 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3812
Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-libmysql55client18-8217 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-libmysql55client18-8217 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-libmysql55client18-8217 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-libmysql55client18-8217 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64): libmysql55client_r18-32bit-5.5.32-0.9.1 libmysqlclient_r15-32bit-5.0.96-0.6.9 - SUSE Linux Enterprise Software Development Kit 11 SP3 (ia64): libmysql55client_r18-x86-5.5.32-0.9.1 libmysqlclient_r15-x86-5.0.96-0.6.9 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 5.5.32]: libmysql55client18-5.5.32-0.9.1 libmysql55client_r18-5.5.32-0.9.1 libmysqlclient15-5.0.96-0.6.9 libmysqlclient_r15-5.0.96-0.6.9 mysql-5.5.32-0.9.1 mysql-client-5.5.32-0.9.1 mysql-tools-5.5.32-0.9.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64) [New Version: 5.5.32]: libmysql55client18-32bit-5.5.32-0.9.1 libmysqlclient15-32bit-5.0.96-0.6.9 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 5.5.32]: libmysql55client18-5.5.32-0.9.1 libmysql55client_r18-5.5.32-0.9.1 libmysqlclient15-5.0.96-0.6.9 libmysqlclient_r15-5.0.96-0.6.9 mysql-5.5.32-0.9.1 mysql-client-5.5.32-0.9.1 mysql-tools-5.5.32-0.9.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64) [New Version: 5.5.32]: libmysql55client18-32bit-5.5.32-0.9.1 libmysqlclient15-32bit-5.0.96-0.6.9 - SUSE Linux Enterprise Server 11 SP3 (ia64) [New Version: 5.5.32]: libmysql55client18-x86-5.5.32-0.9.1 libmysqlclient15-x86-5.0.96-0.6.9 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 5.5.32]: libmysql55client18-5.5.32-0.9.1 libmysql55client_r18-5.5.32-0.9.1 libmysqlclient15-5.0.96-0.6.9 libmysqlclient_r15-5.0.96-0.6.9 mysql-5.5.32-0.9.1 mysql-client-5.5.32-0.9.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64) [New Version: 5.5.32]: libmysql55client18-32bit-5.5.32-0.9.1 libmysql55client_r18-32bit-5.5.32-0.9.1 libmysqlclient15-32bit-5.0.96-0.6.9 libmysqlclient_r15-32bit-5.0.96-0.6.9 References: http://support.novell.com/security/cve/CVE-2013-1861.html http://support.novell.com/security/cve/CVE-2013-3783.html http://support.novell.com/security/cve/CVE-2013-3793.html http://support.novell.com/security/cve/CVE-2013-3794.html http://support.novell.com/security/cve/CVE-2013-3795.html http://support.novell.com/security/cve/CVE-2013-3796.html http://support.novell.com/security/cve/CVE-2013-3798.html http://support.novell.com/security/cve/CVE-2013-3801.html http://support.novell.com/security/cve/CVE-2013-3802.html http://support.novell.com/security/cve/CVE-2013-3804.html http://support.novell.com/security/cve/CVE-2013-3805.html http://support.novell.com/security/cve/CVE-2013-3806.html http://support.novell.com/security/cve/CVE-2013-3807.html http://support.novell.com/security/cve/CVE-2013-3808.html http://support.novell.com/security/cve/CVE-2013-3809.html http://support.novell.com/security/cve/CVE-2013-3810.html http://support.novell.com/security/cve/CVE-2013-3811.html http://support.novell.com/security/cve/CVE-2013-3812.html https://bugzilla.novell.com/734436 https://bugzilla.novell.com/768832 https://bugzilla.novell.com/780019 https://bugzilla.novell.com/789263 https://bugzilla.novell.com/791863 https://bugzilla.novell.com/803040 https://bugzilla.novell.com/830086 https://bugzilla.novell.com/834028 https://bugzilla.novell.com/834967 http://download.novell.com/patch/finder/?keywords=ee1853a305dde831618306e6f9... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org