-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0656
                         mysql-5.5 security update
                                5 May 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mysql-5.5
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-2440 CVE-2014-2438 CVE-2014-2436
                   CVE-2014-2432 CVE-2014-2431 CVE-2014-2430
                   CVE-2014-2419 CVE-2014-0384 CVE-2014-0001

Reference:         ASB-2014.0053
                   ESB-2014.0211
                   ESB-2014.0207
                   ESB-2014.0194

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2919

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2919-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
May 03, 2014                           http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : mysql-5.5
CVE ID         : CVE-2014-0001 CVE-2014-0384 CVE-2014-2419 CVE-2014-2430 
                 CVE-2014-2431 CVE-2014-2432 CVE-2014-2436 CVE-2014-2438
                 CVE-2014-2440
Debian Bug     : 737596 744910

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.37. Please see the MySQL 5.5 Release Notes and Oracle's
Critical Patch Update advisory for further details:

 http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-36.html
 http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-37.html
 http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html

For the stable distribution (wheezy), these problems have been fixed in
version 5.5.37-0+wheezy1.

For the testing distribution (jessie), these problems have been fixed in
version 5.5.37-1.

For the unstable distribution (sid), these problems have been fixed in
version 5.5.37-1.

We recommend that you upgrade your mysql-5.5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=g7vR
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HlUr
-----END PGP SIGNATURE-----