Mandriva Linux Security Advisory MDVSA-2014:210
http://www.mandriva.com/en/
______________________________
Package : mariadb
Date : October 28, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
Multiple vulnerabilities has been discovered and corrected in mariadb:
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier
and 5.6.20 and earlier allows remote authenticated users to affect
availability via vectors related to SERVER:INNODB DML FOREIGN KEYS
(CVE-2014-6464).
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and eariler
and 5.6.20 and earlier allows remote authenticated users to affect
availability via vectors related to SERVER:OPTIMIZER (CVE-2014-6469).
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier,
and 5.6.20 and earlier, allows remote authenticated users to affect
confidentiality, integrity, and availability via vectors related to
SERVER:DML (CVE-2014-6507).
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier
and 5.6.20 and earlier allows remote authenticated users to affect
confidentiality, integrity, and availability via vectors related to
SERVER:DML (CVE-2014-6555).
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and
earlier, and 5.6.20 and earlier, allows remote attackers to affect
confidentiality via vectors related to C API SSL CERTIFICATE HANDLING
(CVE-2014-6559).
The updated packages have been upgraded to the 5.5.40 version which
is not vulnerable to these issues.
Additionally MariaDB 5.5.40 removed the bundled copy of jemalloc from
the source tarball and only builds with jemalloc if a system copy
of the jemalloc library is detecting during the build. This update
provides the jemalloc library packages to resolve this issue.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
https://mariadb.com/kb/en/
http://www.oracle.com/
https://bugs.mageia.org/show_
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
d3777064729ac827717ee166be4d65
3544defe7a86633549c42285508dc0
412cf1c80ce6310949189a399019cd
354662572fd04b7b8e4bf2f6ea4ab1
eb88bc949042a53e31e07f231aaa79
662b8680f36ef37b22546cb9cb7999
a46730286be82d1ac5465172720042
07e236cfab3ac7c225a5b61c0f7449
4d277e041e4eac4f3da19e35b77f59
51ac1072841e4227f2082620e389b0
e7e7390b3dc47d105cb0735e884fc6
b1809dc518b89e3a986439db654fc9
c7a4f6e406a442e4c3b19a3ceccb21
6fe78e03875f2ec2227f6ef7d0f90e
1ef05e7a3532d97afb4dfa68f2d5b6
842bec02ddec2fd3dca28e907080ae
c820c46809e494c1d5ad83526d1f1e
7e6c522174ff1513cd9f09b2cf5fef
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą