Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] openSUSE-SU-2016:1664-1: important: Security update for mariadb

Recommended Posts

openSUSE Security Update: Security update for mariadb

______________________________________________________________________________

 

Announcement ID: openSUSE-SU-2016:1664-1

Rating: important

References: #963806 #963810 #970287 #970295 #979524 #980904

 

Cross-References: CVE-2016-0505 CVE-2016-0546 CVE-2016-0596

CVE-2016-0597 CVE-2016-0598 CVE-2016-0600

CVE-2016-0606 CVE-2016-0608 CVE-2016-0609

CVE-2016-0616 CVE-2016-0640 CVE-2016-0641

CVE-2016-0642 CVE-2016-0643 CVE-2016-0644

CVE-2016-0646 CVE-2016-0647 CVE-2016-0648

CVE-2016-0649 CVE-2016-0650 CVE-2016-0651

CVE-2016-0655 CVE-2016-0666 CVE-2016-0668

CVE-2016-2047

Affected Products:

openSUSE 13.2

______________________________________________________________________________

 

An update that fixes 25 vulnerabilities is now available.

 

Description:

 

mariadb was updated to version 10.0.25 to fix 25 security issues.

 

These security issues were fixed:

- CVE-2016-0505: Unspecified vulnerability allowed remote authenticated

users to affect availability via unknown vectors related to Options

(bsc#980904).

- CVE-2016-0546: Unspecified vulnerability allowed local users to affect

confidentiality, integrity, and availability via unknown vectors related

to Client (bsc#980904).

- CVE-2016-0596: Unspecified vulnerability allowed remote authenticated

users to affect availability via vectors related to DML (bsc#980904).

- CVE-2016-0597: Unspecified vulnerability allowed remote authenticated

users to affect availability via unknown vectors related to Optimizer

(bsc#980904).

- CVE-2016-0598: Unspecified vulnerability allowed remote authenticated

users to affect availability via vectors related to DML (bsc#980904).

- CVE-2016-0600: Unspecified vulnerability allowed remote authenticated

users to affect availability via unknown vectors related to InnoDB

(bsc#980904).

- CVE-2016-0606: Unspecified vulnerability allowed remote authenticated

users to affect integrity via unknown vectors related to encryption

(bsc#980904).

- CVE-2016-0608: Unspecified vulnerability allowed remote authenticated

users to affect availability via vectors related to UDF (bsc#980904).

- CVE-2016-0609: Unspecified vulnerability allowed remote authenticated

users to affect availability via unknown vectors related to privileges

(bsc#980904).

- CVE-2016-0616: Unspecified vulnerability allowed remote authenticated

users to affect availability via unknown vectors related to Optimizer

(bsc#980904).

- CVE-2016-0640: Unspecified vulnerability allowed local users to affect

integrity and availability via vectors related to DML (bsc#980904).

- CVE-2016-0641: Unspecified vulnerability allowed local users to affect

confidentiality and availability via vectors related to InnoDB

(bsc#980904).

- CVE-2016-0642: Unspecified vulnerability allowed local users to affect

integrity and availability via vectors related to Federated (bsc#980904).

- CVE-2016-0643: Unspecified vulnerability allowed local users to affect

confidentiality via vectors related to DML (bsc#980904).

- CVE-2016-0644: Unspecified vulnerability allowed local users to affect

availability via vectors related to DDL (bsc#980904).

- CVE-2016-0646: Unspecified vulnerability allowed local users to affect

availability via vectors related to DML (bsc#980904).

- CVE-2016-0647: Unspecified vulnerability allowed local users to affect

availability via vectors related to FTS (bsc#980904).

- CVE-2016-0648: Unspecified vulnerability allowed local users to affect

availability via vectors related to PS (bsc#980904).

- CVE-2016-0649: Unspecified vulnerability allowed local users to affect

availability via vectors related to PS (bsc#980904).

- CVE-2016-0650: Unspecified vulnerability allowed local users to affect

availability via vectors related to Replication (bsc#980904).

- CVE-2016-0651: Unspecified vulnerability allowed local users to affect

availability via vectors related to Optimizer (bsc#980904).

- CVE-2016-0655: Unspecified vulnerability allowed local users to affect

availability via vectors related to InnoDB (bsc#980904).

- CVE-2016-0666: Unspecified vulnerability allowed local users to affect

availability via vectors related to Security: Privileges (bsc#980904).

- CVE-2016-0668: Unspecified vulnerability allowed local users to affect

availability via vectors related to InnoDB (bsc#980904).

- CVE-2016-2047: The ssl_verify_server_cert function in

sql-common/client.c did not properly verify that the server hostname

matches a domain name in the subject's Common Name (CN) or

subjectAltName field of the X.509 certificate, which allowed

man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in

a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com

(bsc#963806).

 

These non-security issues were fixed:

- bsc#970295: Fix the leftovers of "logrotate.d/mysql" string in the

logrotate error message. Occurrences of this string were changed to

"logrotate.d/mariadb"

- bsc#963810: Add 'log-error' and 'secure-file-priv' configuration options

* add '/etc/my.cnf.d/error_log.conf' that specifies 'log-error =

/var/log/mysql/mysqld.log'. If no path is set, the error log is

written to '/var/lib/mysql/$HOSTNAME.err', which is not picked up by

logrotate.

* add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that 'LOAD

DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work with files

in the directory specified by 'secure-file-priv'

option (='/var/lib/mysql-files').

- Temporarily disable OQGraph. It seems to need the boost library with the

version not earlier than 1.40 and not later than 1.55 (MDEV-9479)

- boo#979524: Don't remove HandlerSocket plugin

- boo#970287: Add "BuildRequires: jemalloc-devel" in order to allow

enabling of the TokuDB plugin

- run 'usermod -g mysql mysql' only if mysql user is not in mysql group.

Run 'usermod -s /bin/false/ mysql' only if mysql user doesn't have

'/bin/false' shell set.

- Re-enable profiling support

 

 

Patch Instructions:

 

To install this openSUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- openSUSE 13.2:

 

zypper in -t patch openSUSE-2016-761=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- openSUSE 13.2 (i586 x86_64):

 

libmysqlclient-devel-10.0.25-2.24.1

libmysqlclient18-10.0.25-2.24.1

libmysqlclient18-debuginfo-10.0.25-2.24.1

libmysqlclient_r18-10.0.25-2.24.1

libmysqld-devel-10.0.25-2.24.1

libmysqld18-10.0.25-2.24.1

libmysqld18-debuginfo-10.0.25-2.24.1

mariadb-10.0.25-2.24.1

mariadb-bench-10.0.25-2.24.1

mariadb-bench-debuginfo-10.0.25-2.24.1

mariadb-client-10.0.25-2.24.1

mariadb-client-debuginfo-10.0.25-2.24.1

mariadb-debuginfo-10.0.25-2.24.1

mariadb-debugsource-10.0.25-2.24.1

mariadb-errormessages-10.0.25-2.24.1

mariadb-test-10.0.25-2.24.1

mariadb-test-debuginfo-10.0.25-2.24.1

mariadb-tools-10.0.25-2.24.1

mariadb-tools-debuginfo-10.0.25-2.24.1

 

- openSUSE 13.2 (x86_64):

 

libmysqlclient18-32bit-10.0.25-2.24.1

libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1

libmysqlclient_r18-32bit-10.0.25-2.24.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2016-0505.html

https://www.suse.com/security/cve/CVE-2016-0546.html

https://www.suse.com/security/cve/CVE-2016-0596.html

https://www.suse.com/security/cve/CVE-2016-0597.html

https://www.suse.com/security/cve/CVE-2016-0598.html

https://www.suse.com/security/cve/CVE-2016-0600.html

https://www.suse.com/security/cve/CVE-2016-0606.html

https://www.suse.com/security/cve/CVE-2016-0608.html

https://www.suse.com/security/cve/CVE-2016-0609.html

https://www.suse.com/security/cve/CVE-2016-0616.html

https://www.suse.com/security/cve/CVE-2016-0640.html

https://www.suse.com/security/cve/CVE-2016-0641.html

https://www.suse.com/security/cve/CVE-2016-0642.html

https://www.suse.com/security/cve/CVE-2016-0643.html

https://www.suse.com/security/cve/CVE-2016-0644.html

https://www.suse.com/security/cve/CVE-2016-0646.html

https://www.suse.com/security/cve/CVE-2016-0647.html

https://www.suse.com/security/cve/CVE-2016-0648.html

https://www.suse.com/security/cve/CVE-2016-0649.html

https://www.suse.com/security/cve/CVE-2016-0650.html

https://www.suse.com/security/cve/CVE-2016-0651.html

https://www.suse.com/security/cve/CVE-2016-0655.html

https://www.suse.com/security/cve/CVE-2016-0666.html

https://www.suse.com/security/cve/CVE-2016-0668.html

https://www.suse.com/security/cve/CVE-2016-2047.html

https://bugzilla.suse.com/963806

https://bugzilla.suse.com/963810

https://bugzilla.suse.com/970287

https://bugzilla.suse.com/970295

https://bugzilla.suse.com/979524

https://bugzilla.suse.com/980904

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×