[SUSE-SU-2016:1620-1] Security update for mariadb
Security update for mariadb
mariadb was updated to version 10.0.25 to fix 25 security issues.
These security issues were fixed:
- CVE-2016-0505: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Options (bsc#980904).
- CVE-2016-0546: Unspecified vulnerability allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Client (bsc#980904).
- CVE-2016-0596: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0597: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0598: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0600: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to InnoDB (bsc#980904).
- CVE-2016-0606: Unspecified vulnerability allowed remote authenticated users to affect integrity via unknown vectors related to encryption (bsc#980904).
- CVE-2016-0608: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to UDF (bsc#980904).
- CVE-2016-0609: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to privileges (bsc#980904).
- CVE-2016-0616: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#980904).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#980904).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#980904).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#980904).
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#980904).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#980904).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#980904).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#980904).
- CVE-2016-0655: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#980904).
- CVE-2016-0668: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).
These non-security issues were fixed:
- bsc#961935: Remove the leftovers of 'openSUSE' string in the '-DWITH_COMMENT' and 'DCOMPILATION_COMMENT' options
- bsc#970287: remove ha_tokudb.so plugin and tokuft_logprint and tokuftdump binaries as TokuDB storage engine requires the jemalloc library that isn't present in SLE-12-SP1
- bsc#970295: Fix the leftovers of 'logrotate.d/mysql' string in the logrotate error message. Occurrences of this string were changed to 'logrotate.d/mariadb'
- bsc#963810: Add 'log-error' and 'secure-file-priv' configuration options
* add '/etc/my.cnf.d/error_log.conf' that specifies
'log-error = /var/log/mysql/mysqld.log'. If no path is set,
the error log is written to '/var/lib/mysql/$HOSTNAME.err',
which is not picked up by logrotate.
* add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that
'LOAD DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work
with files in the directory specified by 'secure-file-priv'
option (='/var/lib/mysql-files').
- ID
- SUSE-SU-2016:1620-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2016/suse-su-20161620-1/
- Published
-
2016-06-17T14:56:28
(8 years ago) - Modified
-
2016-06-17T14:56:28
(8 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2016-684
- ALAS-2016-701
- ALAS-2016-738
- ALPINE:CVE-2016-0643
- ALPINE:CVE-2016-0647
- ALPINE:CVE-2016-0648
- ALPINE:CVE-2016-0666
- DSA-3453-1
- DSA-3459-1
- DSA-3557-1
- DSA-3595-1
- ELSA-2016-0534
- ELSA-2016-1602
- FEDORA-2016-1aaf308de4
- FEDORA-2016-5cb344dd7e
- FEDORA-2016-65a1f22818
- FEDORA-2016-7c48036d73
- FEDORA-2016-868c170507
- FEDORA-2016-e30164d0a2
- FREEBSD:8C2B2F11-0EBE-11E6-B55E-B499BAEBFEAF
- RHSA-2016:0534
- RHSA-2016:1602
- SUSE-SU-2016:0348-1
- SUSE-SU-2016:1279-1
- SUSE-SU-2016:1619-1
- USN-2881-1
- USN-2953-1
- USN-2954-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/mariadb?arch=x86_64&distro=sles-12&sp=1 | suse | mariadb | < 10.0.25-6.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/mariadb?arch=x86_64&distro=sled-12&sp=1 | suse | mariadb | < 10.0.25-6.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/mariadb?arch=s390x&distro=sles-12&sp=1 | suse | mariadb | < 10.0.25-6.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/mariadb?arch=ppc64le&distro=sles-12&sp=1 | suse | mariadb | < 10.0.25-6.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/mariadb-tools?arch=x86_64&distro=sles-12&sp=1 | suse | mariadb-tools | < 10.0.25-6.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/mariadb-tools?arch=s390x&distro=sles-12&sp=1 | suse | mariadb-tools | < 10.0.25-6.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/mariadb-tools?arch=ppc64le&distro=sles-12&sp=1 | suse | mariadb-tools | < 10.0.25-6.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/mariadb-errormessages?arch=x86_64&distro=sles-12&sp=1 | suse | mariadb-errormessages | < 10.0.25-6.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/mariadb-errormessages?arch=x86_64&distro=sled-12&sp=1 | suse | mariadb-errormessages | < 10.0.25-6.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/mariadb-errormessages?arch=s390x&distro=sles-12&sp=1 | suse | mariadb-errormessages | < 10.0.25-6.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/mariadb-errormessages?arch=ppc64le&distro=sles-12&sp=1 | suse | mariadb-errormessages | < 10.0.25-6.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/mariadb-client?arch=x86_64&distro=sles-12&sp=1 | suse | mariadb-client | < 10.0.25-6.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/mariadb-client?arch=x86_64&distro=sled-12&sp=1 | suse | mariadb-client | < 10.0.25-6.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/mariadb-client?arch=s390x&distro=sles-12&sp=1 | suse | mariadb-client | < 10.0.25-6.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/mariadb-client?arch=ppc64le&distro=sles-12&sp=1 | suse | mariadb-client | < 10.0.25-6.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/libmysqlclient_r18?arch=x86_64&distro=sled-12&sp=1 | suse | libmysqlclient_r18 | < 10.0.25-6.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/libmysqlclient_r18-32bit?arch=x86_64&distro=sled-12&sp=1 | suse | libmysqlclient_r18-32bit | < 10.0.25-6.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/libmysqlclient18?arch=x86_64&distro=sles-12&sp=1 | suse | libmysqlclient18 | < 10.0.25-6.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/libmysqlclient18?arch=x86_64&distro=sled-12&sp=1 | suse | libmysqlclient18 | < 10.0.25-6.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/libmysqlclient18?arch=s390x&distro=sles-12&sp=1 | suse | libmysqlclient18 | < 10.0.25-6.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/libmysqlclient18?arch=ppc64le&distro=sles-12&sp=1 | suse | libmysqlclient18 | < 10.0.25-6.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/libmysqlclient18-32bit?arch=x86_64&distro=sles-12&sp=1 | suse | libmysqlclient18-32bit | < 10.0.25-6.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/libmysqlclient18-32bit?arch=x86_64&distro=sled-12&sp=1 | suse | libmysqlclient18-32bit | < 10.0.25-6.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/libmysqlclient18-32bit?arch=s390x&distro=sles-12&sp=1 | suse | libmysqlclient18-32bit | < 10.0.25-6.1 | sles-12 | s390x |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |