Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0565 mysql-5.1 security update 19 June 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: mysql-5.1 Publisher: Debian Operating System: Debian GNU/Linux 6 Impact/Access: Access Privileged Data -- Existing Account Reduced Security -- Unknown/Unspecified Resolution: Patch/Upgrade CVE Names: CVE-2012-2122 CVE-2012-1703 CVE-2012-1690 CVE-2012-1688 CVE-2012-0583 Reference: ASB-2012.0084 ASB-2012.0060 Original Bulletin: http://www.debian.org/security/2012/dsa-2496 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-2496-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst June 18, 2012 http://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : mysql-5.1 Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2012-0583 CVE-2012-1688 CVE-2012-1690 CVE-2012-1703 CVE-2012-2122 Debian Bug : 670636 677018 Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.1.63, which includes additional changes, such as performance improvements and corrections for data loss defects. These changes are described in the MySQL release notes at: http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html CVE-2012-2122, an authentication bypass vulnerability, occurs only when MySQL has been built in with certain optimisations enabled. The packages in Debian stable (squeeze) are not known to be affected by this vulnerability. It is addressed in this update nonetheless, so future rebuilds will not become vulnerable to this issue. For the stable distribution (squeeze), these problems have been fixed in version 5.1.63-0+squeeze1. For the testing distribution (wheezy), these problems has been fixed in version 5.1.62-1 of the mysql-5.1 package and version 5.5.24+dfsg-1 of the mysql-5.5 package. We recommend that you upgrade your MySQL packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJP35YQAAoJEL97/wQC1SS+NosIAJx90ueK3F6RfFUd9UhE95SX ZhdLIA7wNe2OLek3BG0iO5SnSSzGNXMBi5Rcbwbi2tzd+0MiiBYy9oy4wxCfRjIW NSbYrTW7dLzlJXPxmDW1gTu8bpSaj8RGlAuXgvI0okyBoYBD25yJyAWq/YtDSIuh hwWWph+1FKB95N8CpN/tRsSr7MAiEVCrGAwl4brmiHIsLopMYCrzwHy4TFOVCcn8 ryyHkmf8D5Xa4z3pcT2CUcVdq0Ad76Fy7uxmgbd5xXCItImnBOJ64bD04G4WA3Fm WI2QoEwCMj6p1523v3RdX9lVnJB7jgY9xKanOb9j8Got71mkpdrPwW3gg1NsuOQ= =kFaD - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBT9/b0e4yVqjM2NGpAQLpkQ/8CUir6U8cHtv7E3V4tPxlRRN0tcZHsjA7 V0aJiALQ4ZC8Pq324FB3+ga3WP3Xri2x2KFB7kpYjnOSrCvzd26hN0PvQ4FFzUNT ws1KFowXn5LUPQdtsSwScPpyTgLgFhqSKgYeFzzBMNRWSQJeNvxDr0XmRDCeAqDY Sj1ykzJHEA78bi6HXqnMfggFPjmolwBuYSVzxZzsOAs44mgkqpG34L59FIg4XaW2 aJC7MULgD66FFn2Iq8E/0bBh/x5JEzP/XACW3iYJDEUqMmCJrxwXeHE6YeOl0YAj sPq9aS6YlBFTNu0ntbVoaAwYj0Sl3z184+AM1J13vXLBS4EiLCKEiX28OON4MdSd xg9o9aFJScnitk1gTqE3umYV8yJcPlfMbL9qoLoW4Hqr032Wonh6uAoSfElnJfEN +z/e5jttRbDh5H3AnFK6qTQaZkOLGdrEtSCsvtZcTtxXJOGrULZ95d8Sjt4dy1bg osgLiMTqL6PmR/qpQyosIf5HVm1sT/9oV5C2N4VDwfgspxPM+caFPV0hrHs3oRNh colUQOqQfVgcBhcK4thv+heoOtlDI9+xAvEm7bGq/wXExtjRL96NcJEHf9PmjGrN kMSxz1nEeV9s8iLFidbPtIX+IbKDvRWL9Ve6DjFYfCVuzHzz1U5MLZ7rJWsns9YK biC/D32zFrs= =WCF4 -----END PGP SIGNATURE-----