-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0565
                         mysql-5.1 security update
                               19 June 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mysql-5.1
Publisher:         Debian
Operating System:  Debian GNU/Linux 6
Impact/Access:     Access Privileged Data -- Existing Account   
                   Reduced Security       -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-2122 CVE-2012-1703 CVE-2012-1690
                   CVE-2012-1688 CVE-2012-0583 

Reference:         ASB-2012.0084
                   ASB-2012.0060

Original Bulletin: 
   http://www.debian.org/security/2012/dsa-2496

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2496-1                   security@debian.org
http://www.debian.org/security/                           Thijs Kinkhorst
June 18, 2012                          http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : mysql-5.1
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2012-0583 CVE-2012-1688 CVE-2012-1690 CVE-2012-1703 
                 CVE-2012-2122
Debian Bug     : 670636 677018

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to a new upstream
version, 5.1.63, which includes additional changes, such as performance
improvements and corrections for data loss defects.  These changes are
described in the MySQL release notes at:
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html

CVE-2012-2122, an authentication bypass vulnerability, occurs only when
MySQL has been built in with certain optimisations enabled. The packages
in Debian stable (squeeze) are not known to be affected by this
vulnerability. It is addressed in this update nonetheless, so future
rebuilds will not become vulnerable to this issue.

For the stable distribution (squeeze), these problems have been fixed in
version 5.1.63-0+squeeze1.

For the testing distribution (wheezy), these problems has been fixed
in version 5.1.62-1 of the mysql-5.1 package and version 5.5.24+dfsg-1
of the mysql-5.5 package.

We recommend that you upgrade your MySQL packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJP35YQAAoJEL97/wQC1SS+NosIAJx90ueK3F6RfFUd9UhE95SX
ZhdLIA7wNe2OLek3BG0iO5SnSSzGNXMBi5Rcbwbi2tzd+0MiiBYy9oy4wxCfRjIW
NSbYrTW7dLzlJXPxmDW1gTu8bpSaj8RGlAuXgvI0okyBoYBD25yJyAWq/YtDSIuh
hwWWph+1FKB95N8CpN/tRsSr7MAiEVCrGAwl4brmiHIsLopMYCrzwHy4TFOVCcn8
ryyHkmf8D5Xa4z3pcT2CUcVdq0Ad76Fy7uxmgbd5xXCItImnBOJ64bD04G4WA3Fm
WI2QoEwCMj6p1523v3RdX9lVnJB7jgY9xKanOb9j8Got71mkpdrPwW3gg1NsuOQ=
=kFaD
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=WCF4
-----END PGP SIGNATURE-----