what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3624-1

Debian Security Advisory 3624-1
Posted Jul 22, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3624-1 - Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.50. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for further details.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-3477, CVE-2016-3521, CVE-2016-3615, CVE-2016-5440
SHA-256 | 53d03f4dfe05293f62735d44f4c1cbc475df2006023022701b93781bd8a27a44

Debian Security Advisory 3624-1

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3624-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 21, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mysql-5.5
CVE ID : CVE-2016-3477 CVE-2016-3521 CVE-2016-3615 CVE-2016-5440

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.50. Please see the MySQL 5.5 Release Notes and Oracle's
Critical Patch Update advisory for further details:

https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

For the stable distribution (jessie), these problems have been fixed in
version 5.5.50-0+deb8u1.

We recommend that you upgrade your mysql-5.5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJXkSLQAAoJEAVMuPMTQ89EEM4P/AuiTqda3ELFhec9OtqKgP1k
toEJePOJ3qcoitpkx4Mmseh83TzzK889wiybUYiehOYCpOpanyBCaziYFN6PNsH/
ZhNbRbHiis8RYNsGrVsphMDio7Djfz8CticClQtdMJ5q+EbpQRtNmryYOeKeRXfM
/hOBmwdmXxWOZWeGwjsWtOKPNDsGJvvaKRjKMzektyDlJyaza8rHnaFluE4ihE+Q
rJfTthbIzzrCo+IiMjc7wPQhGc33BZjLIORJI8qq+HCZ+wXcNOYjgwu5U1/Zf0oW
CRReUGDQwrWycyrPUMzKM6d/FP66Dow+ejB3jimytQOllS4FzCU1Bx3vmEBRXc1p
TbN5gPvi/MLO8fFpdBcFZq8s4loqLtXr6kSrSqSpIaW3X666miOwU2FJUD8Z1ood
gdbS0TtUMs3+t+y32qH4Vs8WIpiIOoFNUIMEYPlARhFsnDIrCV0flPt9cFgihohh
gyUvm8nx/3cmo3AISxFckNcBmo9nnbUPFfAJ/lo5hhSBksJuwyeOQXgDOM1QwLeX
xVUM+iFWH1PsUkcbpKcPUoIt4zF0PpwNo8qEXFPrrI3KoaxiO/5cwBYw4C9Zgrm2
yrICAz4vfMcbLikRXl8X2MxbuLiw2nT6zEwV1y05fsmCanwsFBWyRQimkMccq0Em
OtwDBZQBm5O/MJFPe1xm
=C1nl
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close