openSUSE Security Update: Security update for mariadb
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2016:1664-1
Rating:             important
References:         #963806 #963810 #970287 #970295 #979524 #980904 
                    
Cross-References:   CVE-2016-0505 CVE-2016-0546 CVE-2016-0596
                    CVE-2016-0597 CVE-2016-0598 CVE-2016-0600
                    CVE-2016-0606 CVE-2016-0608 CVE-2016-0609
                    CVE-2016-0616 CVE-2016-0640 CVE-2016-0641
                    CVE-2016-0642 CVE-2016-0643 CVE-2016-0644
                    CVE-2016-0646 CVE-2016-0647 CVE-2016-0648
                    CVE-2016-0649 CVE-2016-0650 CVE-2016-0651
                    CVE-2016-0655 CVE-2016-0666 CVE-2016-0668
                    CVE-2016-2047
Affected Products:
                    openSUSE 13.2
______________________________________________________________________________

   An update that fixes 25 vulnerabilities is now available.

Description:

   mariadb was updated to version 10.0.25 to fix 25 security issues.

   These security issues were fixed:
   - CVE-2016-0505: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Options
     (bsc#980904).
   - CVE-2016-0546: Unspecified vulnerability allowed local users to affect
     confidentiality, integrity, and availability via unknown vectors related
     to Client (bsc#980904).
   - CVE-2016-0596: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to DML (bsc#980904).
   - CVE-2016-0597: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Optimizer
     (bsc#980904).
   - CVE-2016-0598: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to DML (bsc#980904).
   - CVE-2016-0600: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to InnoDB
     (bsc#980904).
   - CVE-2016-0606: Unspecified vulnerability allowed remote authenticated
     users to affect integrity via unknown vectors related to encryption
     (bsc#980904).
   - CVE-2016-0608: Unspecified vulnerability allowed remote authenticated
     users to affect availability via vectors related to UDF (bsc#980904).
   - CVE-2016-0609: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to privileges
     (bsc#980904).
   - CVE-2016-0616: Unspecified vulnerability allowed remote authenticated
     users to affect availability via unknown vectors related to Optimizer
     (bsc#980904).
   - CVE-2016-0640: Unspecified vulnerability allowed local users to affect
     integrity and availability via vectors related to DML (bsc#980904).
   - CVE-2016-0641: Unspecified vulnerability allowed local users to affect
     confidentiality and availability via vectors related to MyISAM
     (bsc#980904).
   - CVE-2016-0642: Unspecified vulnerability allowed local users to affect
     integrity and availability via vectors related to Federated (bsc#980904).
   - CVE-2016-0643: Unspecified vulnerability allowed local users to affect
     confidentiality via vectors related to DML (bsc#980904).
   - CVE-2016-0644: Unspecified vulnerability allowed local users to affect
     availability via vectors related to DDL (bsc#980904).
   - CVE-2016-0646: Unspecified vulnerability allowed local users to affect
     availability via vectors related to DML (bsc#980904).
   - CVE-2016-0647: Unspecified vulnerability allowed local users to affect
     availability via vectors related to FTS (bsc#980904).
   - CVE-2016-0648: Unspecified vulnerability allowed local users to affect
     availability via vectors related to PS (bsc#980904).
   - CVE-2016-0649: Unspecified vulnerability allowed local users to affect
     availability via vectors related to PS (bsc#980904).
   - CVE-2016-0650: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Replication (bsc#980904).
   - CVE-2016-0651: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Optimizer (bsc#980904).
   - CVE-2016-0655: Unspecified vulnerability allowed local users to affect
     availability via vectors related to InnoDB (bsc#980904).
   - CVE-2016-0666: Unspecified vulnerability allowed local users to affect
     availability via vectors related to Security: Privileges (bsc#980904).
   - CVE-2016-0668: Unspecified vulnerability allowed local users to affect
     availability via vectors related to InnoDB (bsc#980904).
   - CVE-2016-2047: The ssl_verify_server_cert function in
     sql-common/client.c did not properly verify that the server hostname
     matches a domain name in the subject's Common Name (CN) or
     subjectAltName field of the X.509 certificate, which allowed
     man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in
     a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com
     (bsc#963806).

   These non-security issues were fixed:
   - bsc#970295: Fix the leftovers of "logrotate.d/mysql" string in the
     logrotate error message. Occurrences of this string were changed to
     "logrotate.d/mariadb"
   - bsc#963810: Add 'log-error' and 'secure-file-priv' configuration options
     * add '/etc/my.cnf.d/error_log.conf' that specifies 'log-error        /var/log/mysql/mysqld.log'. If no path is set, the error log is
       written to '/var/lib/mysql/$HOSTNAME.err', which is not picked up by
       logrotate.
     * add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that 'LOAD
       DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work with files
       in the directory specified by 'secure-file-priv'
       option (='/var/lib/mysql-files').
   - Temporarily disable OQGraph. It seems to need the boost library with the
     version not earlier than 1.40 and not later than 1.55 (MDEV-9479)
   - boo#979524: Don't remove HandlerSocket plugin
   - boo#970287: Add "BuildRequires: jemalloc-devel" in order to allow
     enabling of the TokuDB plugin
   - run 'usermod -g mysql mysql' only if mysql user is not in mysql group.
     Run 'usermod -s /bin/false/ mysql' only if mysql user doesn't have
     '/bin/false' shell set.
   - Re-enable profiling support


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.2:

      zypper in -t patch openSUSE-2016-761=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.2 (i586 x86_64):

      libmysqlclient-devel-10.0.25-2.24.1
      libmysqlclient18-10.0.25-2.24.1
      libmysqlclient18-debuginfo-10.0.25-2.24.1
      libmysqlclient_r18-10.0.25-2.24.1
      libmysqld-devel-10.0.25-2.24.1
      libmysqld18-10.0.25-2.24.1
      libmysqld18-debuginfo-10.0.25-2.24.1
      mariadb-10.0.25-2.24.1
      mariadb-bench-10.0.25-2.24.1
      mariadb-bench-debuginfo-10.0.25-2.24.1
      mariadb-client-10.0.25-2.24.1
      mariadb-client-debuginfo-10.0.25-2.24.1
      mariadb-debuginfo-10.0.25-2.24.1
      mariadb-debugsource-10.0.25-2.24.1
      mariadb-errormessages-10.0.25-2.24.1
      mariadb-test-10.0.25-2.24.1
      mariadb-test-debuginfo-10.0.25-2.24.1
      mariadb-tools-10.0.25-2.24.1
      mariadb-tools-debuginfo-10.0.25-2.24.1

   - openSUSE 13.2 (x86_64):

      libmysqlclient18-32bit-10.0.25-2.24.1
      libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1
      libmysqlclient_r18-32bit-10.0.25-2.24.1


References:

   https://www.suse.com/security/cve/CVE-2016-0505.html
   https://www.suse.com/security/cve/CVE-2016-0546.html
   https://www.suse.com/security/cve/CVE-2016-0596.html
   https://www.suse.com/security/cve/CVE-2016-0597.html
   https://www.suse.com/security/cve/CVE-2016-0598.html
   https://www.suse.com/security/cve/CVE-2016-0600.html
   https://www.suse.com/security/cve/CVE-2016-0606.html
   https://www.suse.com/security/cve/CVE-2016-0608.html
   https://www.suse.com/security/cve/CVE-2016-0609.html
   https://www.suse.com/security/cve/CVE-2016-0616.html
   https://www.suse.com/security/cve/CVE-2016-0640.html
   https://www.suse.com/security/cve/CVE-2016-0641.html
   https://www.suse.com/security/cve/CVE-2016-0642.html
   https://www.suse.com/security/cve/CVE-2016-0643.html
   https://www.suse.com/security/cve/CVE-2016-0644.html
   https://www.suse.com/security/cve/CVE-2016-0646.html
   https://www.suse.com/security/cve/CVE-2016-0647.html
   https://www.suse.com/security/cve/CVE-2016-0648.html
   https://www.suse.com/security/cve/CVE-2016-0649.html
   https://www.suse.com/security/cve/CVE-2016-0650.html
   https://www.suse.com/security/cve/CVE-2016-0651.html
   https://www.suse.com/security/cve/CVE-2016-0655.html
   https://www.suse.com/security/cve/CVE-2016-0666.html
   https://www.suse.com/security/cve/CVE-2016-0668.html
   https://www.suse.com/security/cve/CVE-2016-2047.html
   https://bugzilla.suse.com/963806
   https://bugzilla.suse.com/963810
   https://bugzilla.suse.com/970287
   https://bugzilla.suse.com/970295
   https://bugzilla.suse.com/979524
   https://bugzilla.suse.com/980904

-- 

openSUSE: 2016:1664-1: important: mariadb

June 23, 2016
An update that fixes 25 vulnerabilities is now available.

Description

mariadb was updated to version 10.0.25 to fix 25 security issues. These security issues were fixed: - CVE-2016-0505: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Options (bsc#980904). - CVE-2016-0546: Unspecified vulnerability allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Client (bsc#980904). - CVE-2016-0596: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0597: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904). - CVE-2016-0598: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0600: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to InnoDB (bsc#980904). - CVE-2016-0606: Unspecified vulnerability allowed remote authenticated users to affect integrity via unknown vectors related to encryption (bsc#980904). - CVE-2016-0608: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to UDF (bsc#980904). - CVE-2016-0609: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to privileges (bsc#980904). - CVE-2016-0616: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904). - CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#980904). - CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#980904). - CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#980904). - CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#980904). - CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#980904). - CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#980904). - CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#980904). - CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904). - CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904). - CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#980904). - CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#980904). - CVE-2016-0655: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904). - CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#980904). - CVE-2016-0668: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904). - CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com (bsc#963806). These non-security issues were fixed: - bsc#970295: Fix the leftovers of "logrotate.d/mysql" string in the logrotate error message. Occurrences of this string were changed to "logrotate.d/mariadb" - bsc#963810: Add 'log-error' and 'secure-file-priv' configuration options * add '/etc/my.cnf.d/error_log.conf' that specifies 'log-error /var/log/mysql/mysqld.log'. If no path is set, the error log is written to '/var/lib/mysql/$HOSTNAME.err', which is not picked up by logrotate. * add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that 'LOAD DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work with files in the directory specified by 'secure-file-priv' option (='/var/lib/mysql-files'). - Temporarily disable OQGraph. It seems to need the boost library with the version not earlier than 1.40 and not later than 1.55 (MDEV-9479) - boo#979524: Don't remove HandlerSocket plugin - boo#970287: Add "BuildRequires: jemalloc-devel" in order to allow enabling of the TokuDB plugin - run 'usermod -g mysql mysql' only if mysql user is not in mysql group. Run 'usermod -s /bin/false/ mysql' only if mysql user doesn't have '/bin/false' shell set. - Re-enable profiling support

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-761=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.2 (i586 x86_64): libmysqlclient-devel-10.0.25-2.24.1 libmysqlclient18-10.0.25-2.24.1 libmysqlclient18-debuginfo-10.0.25-2.24.1 libmysqlclient_r18-10.0.25-2.24.1 libmysqld-devel-10.0.25-2.24.1 libmysqld18-10.0.25-2.24.1 libmysqld18-debuginfo-10.0.25-2.24.1 mariadb-10.0.25-2.24.1 mariadb-bench-10.0.25-2.24.1 mariadb-bench-debuginfo-10.0.25-2.24.1 mariadb-client-10.0.25-2.24.1 mariadb-client-debuginfo-10.0.25-2.24.1 mariadb-debuginfo-10.0.25-2.24.1 mariadb-debugsource-10.0.25-2.24.1 mariadb-errormessages-10.0.25-2.24.1 mariadb-test-10.0.25-2.24.1 mariadb-test-debuginfo-10.0.25-2.24.1 mariadb-tools-10.0.25-2.24.1 mariadb-tools-debuginfo-10.0.25-2.24.1 - openSUSE 13.2 (x86_64): libmysqlclient18-32bit-10.0.25-2.24.1 libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1 libmysqlclient_r18-32bit-10.0.25-2.24.1


References

https://www.suse.com/security/cve/CVE-2016-0505.html https://www.suse.com/security/cve/CVE-2016-0546.html https://www.suse.com/security/cve/CVE-2016-0596.html https://www.suse.com/security/cve/CVE-2016-0597.html https://www.suse.com/security/cve/CVE-2016-0598.html https://www.suse.com/security/cve/CVE-2016-0600.html https://www.suse.com/security/cve/CVE-2016-0606.html https://www.suse.com/security/cve/CVE-2016-0608.html https://www.suse.com/security/cve/CVE-2016-0609.html https://www.suse.com/security/cve/CVE-2016-0616.html https://www.suse.com/security/cve/CVE-2016-0640.html https://www.suse.com/security/cve/CVE-2016-0641.html https://www.suse.com/security/cve/CVE-2016-0642.html https://www.suse.com/security/cve/CVE-2016-0643.html https://www.suse.com/security/cve/CVE-2016-0644.html https://www.suse.com/security/cve/CVE-2016-0646.html https://www.suse.com/security/cve/CVE-2016-0647.html https://www.suse.com/security/cve/CVE-2016-0648.html https://www.suse.com/security/cve/CVE-2016-0649.html https://www.suse.com/security/cve/CVE-2016-0650.html https://www.suse.com/security/cve/CVE-2016-0651.html https://www.suse.com/security/cve/CVE-2016-0655.html https://www.suse.com/security/cve/CVE-2016-0666.html https://www.suse.com/security/cve/CVE-2016-0668.html https://www.suse.com/security/cve/CVE-2016-2047.html https://bugzilla.suse.com/963806 https://bugzilla.suse.com/963810 https://bugzilla.suse.com/970287 https://bugzilla.suse.com/970295 https://bugzilla.suse.com/979524 https://bugzilla.suse.com/980904--


Severity
Announcement ID: openSUSE-SU-2016:1664-1
Rating: important
Affected Products: openSUSE 13.2

Related News