openSUSE-SU-2017:2868-1: important: Security update for mysql-community-server

openSUSE Security Update: Security update for mysql-community-server
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2868-1
Rating: important
References: #1039034 #1064096 #1064100 #1064101 #1064102
#1064104 #1064105 #1064107 #1064108 #1064112
#1064115 #1064116 #1064117 #1064118 #1064119

Cross-References: CVE-2017-10155 CVE-2017-10227 CVE-2017-10268
CVE-2017-10276 CVE-2017-10279 CVE-2017-10283
CVE-2017-10286 CVE-2017-10294 CVE-2017-10314
CVE-2017-10378 CVE-2017-10379 CVE-2017-10384
CVE-2017-3731
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that solves 13 vulnerabilities and has two fixes
is now available.

Description:

This update for mysql-community-server to 5.6.38 fixes the following
issues:

Full list of changes:

http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-38.html

CVEs fixed:

– [boo#1064116] CVE-2017-10379
– [boo#1064117] CVE-2017-10384
– [boo#1064115] CVE-2017-10378
– [boo#1064101] CVE-2017-10268
– [boo#1064096] CVE-2017-10155
– [boo#1064118] CVE-2017-3731
– [boo#1064102] CVE-2017-10276
– [boo#1064105] CVE-2017-10283
– [boo#1064112] CVE-2017-10314
– [boo#1064100] CVE-2017-10227
– [boo#1064104] CVE-2017-10279
– [boo#1064108] CVE-2017-10294
– [boo#1064107] CVE-2017-10286

Additional changes:

– add “BuildRequires: unixODBC-devel” to allow ODBC support for Connect
engine [boo#1039034]
– update filename in /var/adm/update-messages to match documentation, and
build-compare pattern
– some scripts from the tools subpackage, namely: wsrep_sst_xtrabackup,
wsrep_sst_mariabackup.sh and wsrep_sst_xtrabackup-v2.sh need socat
– fixed incorrect descriptions and mismatching RPM groups

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-1196=1

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1196=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

libmysql56client18-5.6.38-30.1
libmysql56client18-debuginfo-5.6.38-30.1
libmysql56client_r18-5.6.38-30.1
mysql-community-server-5.6.38-30.1
mysql-community-server-bench-5.6.38-30.1
mysql-community-server-bench-debuginfo-5.6.38-30.1
mysql-community-server-client-5.6.38-30.1
mysql-community-server-client-debuginfo-5.6.38-30.1
mysql-community-server-debuginfo-5.6.38-30.1
mysql-community-server-debugsource-5.6.38-30.1
mysql-community-server-test-5.6.38-30.1
mysql-community-server-test-debuginfo-5.6.38-30.1
mysql-community-server-tools-5.6.38-30.1
mysql-community-server-tools-debuginfo-5.6.38-30.1

– openSUSE Leap 42.3 (noarch):

mysql-community-server-errormessages-5.6.38-30.1

– openSUSE Leap 42.3 (x86_64):

libmysql56client18-32bit-5.6.38-30.1
libmysql56client18-debuginfo-32bit-5.6.38-30.1
libmysql56client_r18-32bit-5.6.38-30.1

– openSUSE Leap 42.2 (i586 x86_64):

libmysql56client18-5.6.38-24.12.1
libmysql56client18-debuginfo-5.6.38-24.12.1
libmysql56client_r18-5.6.38-24.12.1
mysql-community-server-5.6.38-24.12.1
mysql-community-server-bench-5.6.38-24.12.1
mysql-community-server-bench-debuginfo-5.6.38-24.12.1
mysql-community-server-client-5.6.38-24.12.1
mysql-community-server-client-debuginfo-5.6.38-24.12.1
mysql-community-server-debuginfo-5.6.38-24.12.1
mysql-community-server-debugsource-5.6.38-24.12.1
mysql-community-server-test-5.6.38-24.12.1
mysql-community-server-test-debuginfo-5.6.38-24.12.1
mysql-community-server-tools-5.6.38-24.12.1
mysql-community-server-tools-debuginfo-5.6.38-24.12.1

– openSUSE Leap 42.2 (x86_64):

libmysql56client18-32bit-5.6.38-24.12.1
libmysql56client18-debuginfo-32bit-5.6.38-24.12.1
libmysql56client_r18-32bit-5.6.38-24.12.1

– openSUSE Leap 42.2 (noarch):

mysql-community-server-errormessages-5.6.38-24.12.1

References:

https://www.suse.com/security/cve/CVE-2017-10155.html
https://www.suse.com/security/cve/CVE-2017-10227.html
https://www.suse.com/security/cve/CVE-2017-10268.html
https://www.suse.com/security/cve/CVE-2017-10276.html
https://www.suse.com/security/cve/CVE-2017-10279.html
https://www.suse.com/security/cve/CVE-2017-10283.html
https://www.suse.com/security/cve/CVE-2017-10286.html
https://www.suse.com/security/cve/CVE-2017-10294.html
https://www.suse.com/security/cve/CVE-2017-10314.html
https://www.suse.com/security/cve/CVE-2017-10378.html
https://www.suse.com/security/cve/CVE-2017-10379.html
https://www.suse.com/security/cve/CVE-2017-10384.html
https://www.suse.com/security/cve/CVE-2017-3731.html
https://bugzilla.suse.com/1039034
https://bugzilla.suse.com/1064096
https://bugzilla.suse.com/1064100
https://bugzilla.suse.com/1064101
https://bugzilla.suse.com/1064102
https://bugzilla.suse.com/1064104
https://bugzilla.suse.com/1064105
https://bugzilla.suse.com/1064107
https://bugzilla.suse.com/1064108
https://bugzilla.suse.com/1064112
https://bugzilla.suse.com/1064115
https://bugzilla.suse.com/1064116
https://bugzilla.suse.com/1064117
https://bugzilla.suse.com/1064118
https://bugzilla.suse.com/1064119


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org