[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2016:1279-1 -- SLES libmysql55client_r18, libmysql55client18, mysql

ID: oval:org.secpod.oval:def:89045237Date: (C)2021-08-03   (M)2023-12-26
Class: PATCHFamily: unix




mysql was updated to version 5.5.49 to fix 13 security issues. These security issues were fixed: - CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL . - CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML . - CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS . - CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML . - CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM . - CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated . - CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML . - CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges . - CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer . - CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication . - CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS . - CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS . - CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject"s Common Name or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a /CN= string in a field in a certificate, as demonstrated by /OU=/CN=bar.com/CN=foo.com

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
libmysql55client_r18
libmysql55client18
mysql
Reference:
SUSE-SU-2016:1279-1
CVE-2016-0640
CVE-2016-0641
CVE-2016-0642
CVE-2016-0643
CVE-2016-0644
CVE-2016-0646
CVE-2016-0647
CVE-2016-0648
CVE-2016-0649
CVE-2016-0650
CVE-2016-0651
CVE-2016-0666
CVE-2016-2047
CVE    13
CVE-2016-0642
CVE-2016-0641
CVE-2016-0640
CVE-2016-0651
...
CPE    4
cpe:/a:mysql:mysql
cpe:/a:libmysql55client18:libmysql55client18
cpe:/o:suse:suse_linux_enterprise_server:11:sp4
cpe:/a:libmysql55client_r18:libmysql55client_r18
...

© SecPod Technologies