ESB-2018.3458 - [Debian] mysql: Multiple vulnerabilities 2018-11-06

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3458
                  [DLA 1566-1] mysql-5.5 security update
                              6 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mysql
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Modify Arbitrary Files   -- Existing Account
                   Denial of Service        -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-3282 CVE-2018-3174 CVE-2018-3133
                   CVE-2018-3081 CVE-2018-3070 CVE-2018-3066
                   CVE-2018-3063 CVE-2018-3058 CVE-2018-2767

Reference:         ASB-2018.0258
                   ASB-2018.0171
                   ESB-2018.3257.2
                   ESB-2018.2597
                   ESB-2018.2216

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Package        : mysql-5.5
Version        : 5.5.62-0+deb8u1
CVE ID         : CVE-2018-2767 CVE-2018-3058 CVE-2018-3063 CVE-2018-3066
                 CVE-2018-3070 CVE-2018-3081 CVE-2018-3133 CVE-2018-3174
                 CVE-2018-3282


Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.62, which includes additional changes. Please see the MySQL
5.5 Release Notes and Oracle's Critical Patch Update advisory for
further details:

 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html
 https://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html
 https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

For Debian 8 "Jessie", these problems have been fixed in version
5.5.62-0+deb8u1.

We recommend that you upgrade your mysql-5.5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=26PB
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW+DUn2aOgq3Tt24GAQj1OBAAvi6ff+3nBI0+5R0f41kwXmD9pm4Vak4W
D5bipuMTzSgayCUb3w3puD1FwN9CkueD0mSdk6t4ieRKiIYJuT3ixlfJlI6FmtLh
aUMi84eZlZreuxLy4gZeT7UwE7YvX2kW+KyBhP+3RRQK22bXdy2zMziadCgHvUXD
sTqR0bLHmEOCXotMY5pReijZEipiNQJI2lqIpaqX1uNpl7eLFge877IEJAfMVzNU
04QMbTf4Pmq9ILbxdjDdd6n0cbomzdabnm7293O5jMIqaSlItmiu3smXI3owoLpv
tscd1FGGJZh/nq/Y4F0yrCRQqBhCd/zsjnxRKnpuM4qCAJGbUalWHYHNMNxUlQCj
vzOhgpp36682Bf3G//l3Z982XR2o/EPOAOJ6VfVRFikIsQRE47ZyUZYSbdeBJzr7
Ema/u7te35YWxsAPuyVcS++00FHUdwHb993SKS/0kifk+9t1Vwsp6zV2pjdoxmS7
/t58Eih3jP1wd3y1nmb/9+lhc/QLCDi6gMIUUrB+G2CItpw5HEjMXfeBw7bzRMU8
L7xQERox5ujLciVzOPoIA3kRCznQw16HCmDZJOcMr2BwOGZCwqGxc6gEfKL71uuQ
YAJZY9gzKyPXvuKPnSa1ptbf59/9+FsJ1vxJquXRw/SO1ddo3T0ehm4gUT/PIZpB
cnRzoouhyoA=
=+iR2
-----END PGP SIGNATURE-----

« Back to bulletins