what you don't know can hurt you

Debian Security Advisory 3624-1

Debian Security Advisory 3624-1
Posted Jul 22, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3624-1 - Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.50. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for further details.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-3477, CVE-2016-3521, CVE-2016-3615, CVE-2016-5440
MD5 | 180fd189cb0dde3b66500b2bc724f8b0

Debian Security Advisory 3624-1

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3624-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 21, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mysql-5.5
CVE ID : CVE-2016-3477 CVE-2016-3521 CVE-2016-3615 CVE-2016-5440

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.50. Please see the MySQL 5.5 Release Notes and Oracle's
Critical Patch Update advisory for further details:

https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

For the stable distribution (jessie), these problems have been fixed in
version 5.5.50-0+deb8u1.

We recommend that you upgrade your mysql-5.5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=C1nl
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    13 Files
  • 28
    May 28th
    18 Files
  • 29
    May 29th
    17 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close