exploit the possibilities

Debian Security Advisory 3767-1

Debian Security Advisory 3767-1
Posted Jan 20, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3767-1 - Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.54, which includes additional changes, such as performance improvements, bug fixes, new features, and possibly incompatible changes.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2017-3238, CVE-2017-3243, CVE-2017-3244, CVE-2017-3258, CVE-2017-3265, CVE-2017-3291, CVE-2017-3312, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318
MD5 | d714d26c831e58d796a5bdd1e28e1b55

Debian Security Advisory 3767-1

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3767-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 19, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mysql-5.5
CVE ID : CVE-2017-3238 CVE-2017-3243 CVE-2017-3244 CVE-2017-3258
CVE-2017-3265 CVE-2017-3291 CVE-2017-3312 CVE-2017-3313
CVE-2017-3317 CVE-2017-3318
Debian Bug : 851233

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.54, which includes additional changes, such as performance
improvements, bug fixes, new features, and possibly incompatible
changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
Patch Update advisory for further details:

https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html

For the stable distribution (jessie), these problems have been fixed in
version 5.5.54-0+deb8u1.

We recommend that you upgrade your mysql-5.5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=YePK
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    8 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close