Mailinglist Archive: opensuse-updates (48 mails)

< Previous Next >
openSUSE-SU-2015:1629-1: moderate: Security update for mysql-community-server
openSUSE Security Update: Security update for mysql-community-server
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:1629-1
Rating: moderate
References: #852477 #902396 #938412 #942908 #943096
Cross-References: CVE-2015-2582 CVE-2015-2611 CVE-2015-2617
CVE-2015-2620 CVE-2015-2639 CVE-2015-2641
CVE-2015-2643 CVE-2015-2648 CVE-2015-2661
CVE-2015-4737 CVE-2015-4752 CVE-2015-4756
CVE-2015-4757 CVE-2015-4761 CVE-2015-4767
CVE-2015-4769 CVE-2015-4771 CVE-2015-4772

Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________

An update that fixes 18 vulnerabilities is now available.

Description:


The MySQL Community Server edition was updated to 5.6.26, fixing security
issues and bugs.

All changes:
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-26.html

* Fixed CVEs: CVE-2015-2617, CVE-2015-2648, CVE-2015-2611, CVE-2015-2582
CVE-2015-4752, CVE-2015-4756, CVE-2015-2643, CVE-2015-4772
CVE-2015-4761, CVE-2015-4757, CVE-2015-4737, CVE-2015-4771
CVE-2015-4769, CVE-2015-2639, CVE-2015-2620, CVE-2015-2641
CVE-2015-2661, CVE-2015-4767
* disable Performance Schema by default. Since MySQL 5.6.6 upstream
enabled Performance Schema by default which results in increased memory
usage. The added option disable Performance Schema again in
order to decrease MySQL memory usage [bnc#852477].
* install INFO_BIN and INFO_SRC, noticed in MDEV-6912
* remove superfluous '--group' parameter from mysql-systemd-helper
* make -devel package installable in the presence of LibreSSL
* cleanup after the update-message if it was displayed
* add 'exec' to mysql-systemd-helper to shutdown mysql/mariadb cleanly
[bnc#943096]


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2015-608=1

- openSUSE 13.1:

zypper in -t patch openSUSE-2015-608=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

libmysql56client18-5.6.26-2.9.1
libmysql56client18-debuginfo-5.6.26-2.9.1
libmysql56client_r18-5.6.26-2.9.1
mysql-community-server-5.6.26-2.9.1
mysql-community-server-bench-5.6.26-2.9.1
mysql-community-server-bench-debuginfo-5.6.26-2.9.1
mysql-community-server-client-5.6.26-2.9.1
mysql-community-server-client-debuginfo-5.6.26-2.9.1
mysql-community-server-debuginfo-5.6.26-2.9.1
mysql-community-server-debugsource-5.6.26-2.9.1
mysql-community-server-errormessages-5.6.26-2.9.1
mysql-community-server-test-5.6.26-2.9.1
mysql-community-server-test-debuginfo-5.6.26-2.9.1
mysql-community-server-tools-5.6.26-2.9.1
mysql-community-server-tools-debuginfo-5.6.26-2.9.1

- openSUSE 13.2 (x86_64):

libmysql56client18-32bit-5.6.26-2.9.1
libmysql56client18-debuginfo-32bit-5.6.26-2.9.1
libmysql56client_r18-32bit-5.6.26-2.9.1

- openSUSE 13.1 (i586 x86_64):

libmysql56client18-5.6.26-7.10.1
libmysql56client18-debuginfo-5.6.26-7.10.1
libmysql56client_r18-5.6.26-7.10.1
mysql-community-server-5.6.26-7.10.1
mysql-community-server-bench-5.6.26-7.10.1
mysql-community-server-bench-debuginfo-5.6.26-7.10.1
mysql-community-server-client-5.6.26-7.10.1
mysql-community-server-client-debuginfo-5.6.26-7.10.1
mysql-community-server-debuginfo-5.6.26-7.10.1
mysql-community-server-debugsource-5.6.26-7.10.1
mysql-community-server-errormessages-5.6.26-7.10.1
mysql-community-server-test-5.6.26-7.10.1
mysql-community-server-test-debuginfo-5.6.26-7.10.1
mysql-community-server-tools-5.6.26-7.10.1
mysql-community-server-tools-debuginfo-5.6.26-7.10.1

- openSUSE 13.1 (x86_64):

libmysql56client18-32bit-5.6.26-7.10.1
libmysql56client18-debuginfo-32bit-5.6.26-7.10.1
libmysql56client_r18-32bit-5.6.26-7.10.1


References:

https://www.suse.com/security/cve/CVE-2015-2582.html
https://www.suse.com/security/cve/CVE-2015-2611.html
https://www.suse.com/security/cve/CVE-2015-2617.html
https://www.suse.com/security/cve/CVE-2015-2620.html
https://www.suse.com/security/cve/CVE-2015-2639.html
https://www.suse.com/security/cve/CVE-2015-2641.html
https://www.suse.com/security/cve/CVE-2015-2643.html
https://www.suse.com/security/cve/CVE-2015-2648.html
https://www.suse.com/security/cve/CVE-2015-2661.html
https://www.suse.com/security/cve/CVE-2015-4737.html
https://www.suse.com/security/cve/CVE-2015-4752.html
https://www.suse.com/security/cve/CVE-2015-4756.html
https://www.suse.com/security/cve/CVE-2015-4757.html
https://www.suse.com/security/cve/CVE-2015-4761.html
https://www.suse.com/security/cve/CVE-2015-4767.html
https://www.suse.com/security/cve/CVE-2015-4769.html
https://www.suse.com/security/cve/CVE-2015-4771.html
https://www.suse.com/security/cve/CVE-2015-4772.html
https://bugzilla.suse.com/852477
https://bugzilla.suse.com/902396
https://bugzilla.suse.com/938412
https://bugzilla.suse.com/942908
https://bugzilla.suse.com/943096


< Previous Next >
This Thread
  • No further messages