Operating System:

[SUSE]

Published:

11 December 2015

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.3095
         openSUSE Security Update: Security update to MySQL 5.6.27
                             11 December 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          MySQL
Publisher:        SUSE
Operating System: SUSE
Impact/Access:    Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                  Modify Arbitrary Files          -- Remote/Unauthenticated      
                  Denial of Service               -- Remote/Unauthenticated      
                  Provide Misleading Information  -- Remote with User Interaction
Resolution:       Patch/Upgrade
CVE Names:        CVE-2015-4913 CVE-2015-4910 CVE-2015-4905
                  CVE-2015-4904 CVE-2015-4895 CVE-2015-4890
                  CVE-2015-4879 CVE-2015-4870 CVE-2015-4866
                  CVE-2015-4864 CVE-2015-4862 CVE-2015-4861
                  CVE-2015-4858 CVE-2015-4836 CVE-2015-4833
                  CVE-2015-4830 CVE-2015-4826 CVE-2015-4819
                  CVE-2015-4816 CVE-2015-4815 CVE-2015-4802
                  CVE-2015-4800 CVE-2015-4792 CVE-2015-4766
                  CVE-2015-4730 CVE-2015-3152 CVE-2015-1793
                  CVE-2015-1789 CVE-2015-0288 CVE-2015-0286

Reference:        ASB-2015.0103
                  ASB-2015.0070
                  ESB-2015.0678

- --------------------------BEGIN INCLUDED TEXT--------------------

   openSUSE Security Update: Security update to MySQL 5.6.27
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2015:2243-1
Rating:             important
References:         #924663 #928962 #951391 
Cross-References:   CVE-2015-0286 CVE-2015-0288 CVE-2015-1789
                    CVE-2015-1793 CVE-2015-3152 CVE-2015-4730
                    CVE-2015-4766 CVE-2015-4792 CVE-2015-4800
                    CVE-2015-4802 CVE-2015-4815 CVE-2015-4816
                    CVE-2015-4819 CVE-2015-4826 CVE-2015-4830
                    CVE-2015-4833 CVE-2015-4836 CVE-2015-4858
                    CVE-2015-4861 CVE-2015-4862 CVE-2015-4864
                    CVE-2015-4866 CVE-2015-4870 CVE-2015-4879
                    CVE-2015-4890 CVE-2015-4895 CVE-2015-4904
                    CVE-2015-4905 CVE-2015-4910 CVE-2015-4913
                   
Affected Products:
                    openSUSE Leap 42.1
                    openSUSE 13.2
                    openSUSE 13.1
______________________________________________________________________________

   An update that fixes 30 vulnerabilities is now available.

Description:

   MySQL was updated to 5.6.27 to fix security issues and bugs.

   The following vulnerabilities were fixed as part of the upstream release
   [boo#951391]: CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
   CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800, CVE-2015-4802,
   CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830,
   CVE-2015-4833, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4862,
   CVE-2015-4864, CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
   CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910, CVE-2015-4913

   Details on these and other changes can be found at:
   http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-27.html

   The following security relevant changes are included additionally:

   * CVE-2015-3152: MySQL lacked SSL enforcement. Using
     --ssl-verify-server-cert and --ssl[-*] implies that the ssl connection
     is required. The mysql client will now print an error if ssl is
     required, but the server can not handle a ssl connection [boo#924663],
     [boo#928962]


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.1:

      zypper in -t patch openSUSE-2015-889=1

   - openSUSE 13.2:

      zypper in -t patch openSUSE-2015-889=1

   - openSUSE 13.1:

      zypper in -t patch openSUSE-2015-889=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE Leap 42.1 (i586 x86_64):

      libmysql56client18-5.6.27-8.1
      libmysql56client18-debuginfo-5.6.27-8.1
      libmysql56client_r18-5.6.27-8.1
      mysql-community-server-5.6.27-8.1
      mysql-community-server-bench-5.6.27-8.1
      mysql-community-server-bench-debuginfo-5.6.27-8.1
      mysql-community-server-client-5.6.27-8.1
      mysql-community-server-client-debuginfo-5.6.27-8.1
      mysql-community-server-debuginfo-5.6.27-8.1
      mysql-community-server-debugsource-5.6.27-8.1
      mysql-community-server-errormessages-5.6.27-8.1
      mysql-community-server-test-5.6.27-8.1
      mysql-community-server-test-debuginfo-5.6.27-8.1
      mysql-community-server-tools-5.6.27-8.1
      mysql-community-server-tools-debuginfo-5.6.27-8.1

   - openSUSE Leap 42.1 (x86_64):

      libmysql56client18-32bit-5.6.27-8.1
      libmysql56client18-debuginfo-32bit-5.6.27-8.1
      libmysql56client_r18-32bit-5.6.27-8.1

   - openSUSE 13.2 (i586 x86_64):

      libmysql56client18-5.6.27-2.12.1
      libmysql56client18-debuginfo-5.6.27-2.12.1
      libmysql56client_r18-5.6.27-2.12.1
      mysql-community-server-5.6.27-2.12.1
      mysql-community-server-bench-5.6.27-2.12.1
      mysql-community-server-bench-debuginfo-5.6.27-2.12.1
      mysql-community-server-client-5.6.27-2.12.1
      mysql-community-server-client-debuginfo-5.6.27-2.12.1
      mysql-community-server-debuginfo-5.6.27-2.12.1
      mysql-community-server-debugsource-5.6.27-2.12.1
      mysql-community-server-errormessages-5.6.27-2.12.1
      mysql-community-server-test-5.6.27-2.12.1
      mysql-community-server-test-debuginfo-5.6.27-2.12.1
      mysql-community-server-tools-5.6.27-2.12.1
      mysql-community-server-tools-debuginfo-5.6.27-2.12.1

   - openSUSE 13.2 (x86_64):

      libmysql56client18-32bit-5.6.27-2.12.1
      libmysql56client18-debuginfo-32bit-5.6.27-2.12.1
      libmysql56client_r18-32bit-5.6.27-2.12.1

   - openSUSE 13.1 (i586 x86_64):

      libmysql56client18-5.6.27-7.13.1
      libmysql56client18-debuginfo-5.6.27-7.13.1
      libmysql56client_r18-5.6.27-7.13.1
      mysql-community-server-5.6.27-7.13.1
      mysql-community-server-bench-5.6.27-7.13.1
      mysql-community-server-bench-debuginfo-5.6.27-7.13.1
      mysql-community-server-client-5.6.27-7.13.1
      mysql-community-server-client-debuginfo-5.6.27-7.13.1
      mysql-community-server-debuginfo-5.6.27-7.13.1
      mysql-community-server-debugsource-5.6.27-7.13.1
      mysql-community-server-errormessages-5.6.27-7.13.1
      mysql-community-server-test-5.6.27-7.13.1
      mysql-community-server-test-debuginfo-5.6.27-7.13.1
      mysql-community-server-tools-5.6.27-7.13.1
      mysql-community-server-tools-debuginfo-5.6.27-7.13.1

   - openSUSE 13.1 (x86_64):

      libmysql56client18-32bit-5.6.27-7.13.1
      libmysql56client18-debuginfo-32bit-5.6.27-7.13.1
      libmysql56client_r18-32bit-5.6.27-7.13.1


References:

   https://www.suse.com/security/cve/CVE-2015-0286.html
   https://www.suse.com/security/cve/CVE-2015-0288.html
   https://www.suse.com/security/cve/CVE-2015-1789.html
   https://www.suse.com/security/cve/CVE-2015-1793.html
   https://www.suse.com/security/cve/CVE-2015-3152.html
   https://www.suse.com/security/cve/CVE-2015-4730.html
   https://www.suse.com/security/cve/CVE-2015-4766.html
   https://www.suse.com/security/cve/CVE-2015-4792.html
   https://www.suse.com/security/cve/CVE-2015-4800.html
   https://www.suse.com/security/cve/CVE-2015-4802.html
   https://www.suse.com/security/cve/CVE-2015-4815.html
   https://www.suse.com/security/cve/CVE-2015-4816.html
   https://www.suse.com/security/cve/CVE-2015-4819.html
   https://www.suse.com/security/cve/CVE-2015-4826.html
   https://www.suse.com/security/cve/CVE-2015-4830.html
   https://www.suse.com/security/cve/CVE-2015-4833.html
   https://www.suse.com/security/cve/CVE-2015-4836.html
   https://www.suse.com/security/cve/CVE-2015-4858.html
   https://www.suse.com/security/cve/CVE-2015-4861.html
   https://www.suse.com/security/cve/CVE-2015-4862.html
   https://www.suse.com/security/cve/CVE-2015-4864.html
   https://www.suse.com/security/cve/CVE-2015-4866.html
   https://www.suse.com/security/cve/CVE-2015-4870.html
   https://www.suse.com/security/cve/CVE-2015-4879.html
   https://www.suse.com/security/cve/CVE-2015-4890.html
   https://www.suse.com/security/cve/CVE-2015-4895.html
   https://www.suse.com/security/cve/CVE-2015-4904.html
   https://www.suse.com/security/cve/CVE-2015-4905.html
   https://www.suse.com/security/cve/CVE-2015-4910.html
   https://www.suse.com/security/cve/CVE-2015-4913.html
   https://bugzilla.suse.com/924663
   https://bugzilla.suse.com/928962
   https://bugzilla.suse.com/951391

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVmobAH6ZAP0PgtI9AQJlZw/8Dd1ZbNz1vsduToJHDUcwLZC79QYP2ZHg
XCGOxFV6VoR/74YR/MB5+QJZA5DdtgihUwzQmqbV6eRkKf1jtVaa6yVsuQ16wvkd
Wj8SY4NMBG5bj4GReBttvfOu749+xzb8nPheTRcrNmqEGQaEhAhcpBs4RsBEk2w7
KTV/dDNhMlYHFMAhi4Y6ze5acRM0Oz2Xy1EeOwImA6uYNMg8fqtH3jrW1Wda8a4x
xPXhdouW87heh5y2160c4ekotk8/OmFypf1LyX/RKiSpqHSyAclRoxF74y+ZuAR3
MPLW3qbQB6ApFUDFt/lm7H3fFWe+Q3ObBZlumSxk+Xj2DIx4Vks+IEdf2ClLEDOX
4ghAp++iZiU2y8Dfdp3+yvZ0iBgSEpg84Qiw4zO0rJYgW7G59WByba4EdIf8fq68
1KhxOWgiw0VOBS5emMshNtDG7L8DorBsvO+KU9zF1Kg3HpOyQj2YKlEbBh657BKz
x7icZ4bi8NXq1OEj9pxTXk3TlBm4mxI+ouFHWHIu+0hmXP73xywwO+OQUznAMyOc
cHBMN8LmtOMKC4YGOY6bxbJbzh3C6Jf/r1gqHWn958vOIUk4yXR+ItsXMK51j8++
lCdedUVXuS7brKH4+b7vrQeQWpTx8cppZYh0Fnx+eRJEpmycHSmS6CYfpksx8uqy
x791ob9uGmc=
=Y8uw
-----END PGP SIGNATURE-----