Debian: DSA-2818-1: mysql-5.5 security update

    Date16 Dec 2013
    CategoryDebian
    115
    Posted ByLinuxSecurity Advisories
    Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.5.33, which includes additional changes, such as performance improvements, bug fixes, new features, and possibly incompatible
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2818-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                      Salvatore Bonaccorso
    December 16, 2013                      http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : mysql-5.5
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2013-1861 CVE-2013-2162 CVE-2013-3783 CVE-2013-3793 
                     CVE-2013-3802 CVE-2013-3804 CVE-2013-3809 CVE-2013-3812
                     CVE-2013-3839 CVE-2013-5807
    Debian Bug     : 711600 732306
    
    Several issues have been discovered in the MySQL database server. The
    vulnerabilities are addressed by upgrading MySQL to a new upstream
    version, 5.5.33, which includes additional changes, such as performance
    improvements, bug fixes, new features, and possibly incompatible
    changes. Please see the MySQL 5.5 Release Notes for further details:
    
     http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-32.html
     http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-33.html
    
    In addition this update fixes two issues affecting specifically the
    mysql-5.5 Debian package:
    
    A race condition in the post-installation script of the mysql-server-5.5
    package creates the configuration file "/etc/mysql/debian.cnf" with
    world-readable permissions before restricting the permissions, which
    allows local users to read the file and obtain sensitive information
    such as credentials for the debian-sys-maint to perform
    administration tasks. (CVE-2013-2162)
    
    Matthias Reichl reported that the mysql-5.5 package misses the patches
    applied previous in Debian's mysql-5.1 to drop the database "test" and
    the permissions that allow anonymous access, without a password, from
    localhost to the "test" database and any databases starting with
    "test_". This update reintroduces these patches for the mysql-5.5
    package.
    
    Existing databases and permissions are not touched. Please refer to the
    NEWS file provided with this update for further information.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 5.5.33+dfsg-0+wheezy1.
    
    For the unstable distribution (sid), the Debian specific problems will
    be fixed soon.
    
    We recommend that you upgrade your mysql-5.5 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"14","type":"x","order":"1","pct":53.85,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":15.38,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"8","type":"x","order":"3","pct":30.77,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.