LWN.net Logo

Mageia alert MGASA-2013-0046 (mariadb)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0046: mariadb-5.5.25-2.8.mga2 (2/core)
Date:  Sat, 9 Feb 2013 14:09:04 +0100
Message-ID:  <20130209130904.GA4793@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0046 Date: February 9th, 2013 Affected releases: 2 Media: Core Description: Updated mariadb packages includes fixes for the following security vulnerabilities: A buffer overflow that can cause a server crash or arbitrary code execution (a variant of CVE-2012-5611) fast password brute-forcing using the "change user" command (CVE-2012-5627/MDEV-3915) information leakage about existing user accounts via the protocol handshake (CVE-2012-5615/MDEV-3909) Be advised that for CVE-2012-5615 to be completely closed, it's recommended to remove any anonymous logins. Previously, such a user without access rights was added by default. in addition it fixes MDEV-4029 and rpl.rpl_mdev382 test from mariadb-bench Updated Packages: i586: libmariadb-devel-5.5.25-2.8.mga2.i586.rpm libmariadb-embedded18-5.5.25-2.8.mga2.i586.rpm libmariadb-embedded-devel-5.5.25-2.8.mga2.i586.rpm mariadb-5.5.25-2.8.mga2.i586.rpm mariadb-bench-5.5.25-2.8.mga2.i586.rpm mariadb-client-5.5.25-2.8.mga2.i586.rpm mariadb-common-5.5.25-2.8.mga2.i586.rpm mariadb-common-core-5.5.25-2.8.mga2.i586.rpm mariadb-core-5.5.25-2.8.mga2.i586.rpm mariadb-extra-5.5.25-2.8.mga2.i586.rpm mariadb-feedback-5.5.25-2.8.mga2.i586.rpm mariadb-obsolete-5.5.25-2.8.mga2.i586.rpm mysql-MariaDB-5.5.25-2.8.mga2.i586.rpm mariadb-debug-5.5.25-2.8.mga2.i586.rpm x86_64: lib64mariadb18-5.5.25-2.8.mga2.x86_64.rpm lib64mariadb-devel-5.5.25-2.8.mga2.x86_64.rpm lib64mariadb-embedded18-5.5.25-2.8.mga2.x86_64.rpm lib64mariadb-embedded-devel-5.5.25-2.8.mga2.x86_64.rpm mariadb-5.5.25-2.8.mga2.x86_64.rpm mariadb-bench-5.5.25-2.8.mga2.x86_64.rpm mariadb-client-5.5.25-2.8.mga2.x86_64.rpm mariadb-common-5.5.25-2.8.mga2.x86_64.rpm mariadb-common-core-5.5.25-2.8.mga2.x86_64.rpm mariadb-core-5.5.25-2.8.mga2.x86_64.rpm mariadb-extra-5.5.25-2.8.mga2.x86_64.rpm mariadb-feedback-5.5.25-2.8.mga2.x86_64.rpm mariadb-obsolete-5.5.25-2.8.mga2.x86_64.rpm mysql-MariaDB-5.5.25-2.8.mga2.x86_64.rpm mariadb-debug-5.5.25-2.8.mga2.x86_64.rpm SRPMS: mariadb-5.5.25-2.8.mga2.src.rpm References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5627 https://mariadb.atlassian.net/browse/MDEV-4029 https://mariadb.atlassian.net/browse/MDEV-3915 https://mariadb.atlassian.net/browse/MDEV-3909 https://bugs.mageia.org/show_bug.cgi?id=8921 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds