openSUSE-SU-2015:1629-1: moderate: Security update for mysql-community-server
openSUSE Security Update: Security update for mysql-community-server ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:1629-1 Rating: moderate References: #852477 #902396 #938412 #942908 #943096 Cross-References: CVE-2015-2582 CVE-2015-2611 CVE-2015-2617 CVE-2015-2620 CVE-2015-2639 CVE-2015-2641 CVE-2015-2643 CVE-2015-2648 CVE-2015-2661 CVE-2015-4737 CVE-2015-4752 CVE-2015-4756 CVE-2015-4757 CVE-2015-4761 CVE-2015-4767 CVE-2015-4769 CVE-2015-4771 CVE-2015-4772 Affected Products: openSUSE 13.2 openSUSE 13.1 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. Description: The MySQL Community Server edition was updated to 5.6.26, fixing security issues and bugs. All changes: http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-26.html * Fixed CVEs: CVE-2015-2617, CVE-2015-2648, CVE-2015-2611, CVE-2015-2582 CVE-2015-4752, CVE-2015-4756, CVE-2015-2643, CVE-2015-4772 CVE-2015-4761, CVE-2015-4757, CVE-2015-4737, CVE-2015-4771 CVE-2015-4769, CVE-2015-2639, CVE-2015-2620, CVE-2015-2641 CVE-2015-2661, CVE-2015-4767 * disable Performance Schema by default. Since MySQL 5.6.6 upstream enabled Performance Schema by default which results in increased memory usage. The added option disable Performance Schema again in order to decrease MySQL memory usage [bnc#852477]. * install INFO_BIN and INFO_SRC, noticed in MDEV-6912 * remove superfluous '--group' parameter from mysql-systemd-helper * make -devel package installable in the presence of LibreSSL * cleanup after the update-message if it was displayed * add 'exec' to mysql-systemd-helper to shutdown mysql/mariadb cleanly [bnc#943096] Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-608=1 - openSUSE 13.1: zypper in -t patch openSUSE-2015-608=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): libmysql56client18-5.6.26-2.9.1 libmysql56client18-debuginfo-5.6.26-2.9.1 libmysql56client_r18-5.6.26-2.9.1 mysql-community-server-5.6.26-2.9.1 mysql-community-server-bench-5.6.26-2.9.1 mysql-community-server-bench-debuginfo-5.6.26-2.9.1 mysql-community-server-client-5.6.26-2.9.1 mysql-community-server-client-debuginfo-5.6.26-2.9.1 mysql-community-server-debuginfo-5.6.26-2.9.1 mysql-community-server-debugsource-5.6.26-2.9.1 mysql-community-server-errormessages-5.6.26-2.9.1 mysql-community-server-test-5.6.26-2.9.1 mysql-community-server-test-debuginfo-5.6.26-2.9.1 mysql-community-server-tools-5.6.26-2.9.1 mysql-community-server-tools-debuginfo-5.6.26-2.9.1 - openSUSE 13.2 (x86_64): libmysql56client18-32bit-5.6.26-2.9.1 libmysql56client18-debuginfo-32bit-5.6.26-2.9.1 libmysql56client_r18-32bit-5.6.26-2.9.1 - openSUSE 13.1 (i586 x86_64): libmysql56client18-5.6.26-7.10.1 libmysql56client18-debuginfo-5.6.26-7.10.1 libmysql56client_r18-5.6.26-7.10.1 mysql-community-server-5.6.26-7.10.1 mysql-community-server-bench-5.6.26-7.10.1 mysql-community-server-bench-debuginfo-5.6.26-7.10.1 mysql-community-server-client-5.6.26-7.10.1 mysql-community-server-client-debuginfo-5.6.26-7.10.1 mysql-community-server-debuginfo-5.6.26-7.10.1 mysql-community-server-debugsource-5.6.26-7.10.1 mysql-community-server-errormessages-5.6.26-7.10.1 mysql-community-server-test-5.6.26-7.10.1 mysql-community-server-test-debuginfo-5.6.26-7.10.1 mysql-community-server-tools-5.6.26-7.10.1 mysql-community-server-tools-debuginfo-5.6.26-7.10.1 - openSUSE 13.1 (x86_64): libmysql56client18-32bit-5.6.26-7.10.1 libmysql56client18-debuginfo-32bit-5.6.26-7.10.1 libmysql56client_r18-32bit-5.6.26-7.10.1 References: https://www.suse.com/security/cve/CVE-2015-2582.html https://www.suse.com/security/cve/CVE-2015-2611.html https://www.suse.com/security/cve/CVE-2015-2617.html https://www.suse.com/security/cve/CVE-2015-2620.html https://www.suse.com/security/cve/CVE-2015-2639.html https://www.suse.com/security/cve/CVE-2015-2641.html https://www.suse.com/security/cve/CVE-2015-2643.html https://www.suse.com/security/cve/CVE-2015-2648.html https://www.suse.com/security/cve/CVE-2015-2661.html https://www.suse.com/security/cve/CVE-2015-4737.html https://www.suse.com/security/cve/CVE-2015-4752.html https://www.suse.com/security/cve/CVE-2015-4756.html https://www.suse.com/security/cve/CVE-2015-4757.html https://www.suse.com/security/cve/CVE-2015-4761.html https://www.suse.com/security/cve/CVE-2015-4767.html https://www.suse.com/security/cve/CVE-2015-4769.html https://www.suse.com/security/cve/CVE-2015-4771.html https://www.suse.com/security/cve/CVE-2015-4772.html https://bugzilla.suse.com/852477 https://bugzilla.suse.com/902396 https://bugzilla.suse.com/938412 https://bugzilla.suse.com/942908 https://bugzilla.suse.com/943096
participants (1)
-
opensuse-security@opensuse.org