Package: mysql-5.5
Severity: grave
Tags: security

New MySQL security round:

http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html

CVE-2012-1735   MySQL Server    MySQL Protocol  Server Optimizer        No      
6.8     Network         Low     Single  None  None  Complete  5.5.23 and 
earlier   
CVE-2012-0540   MySQL Server    MySQL Protocol  GIS Extension           No      
4.0     Network         Low     Single  None  None  Partial+  5.1.62 and 
earlier, 5.5.23 and earlier   
CVE-2012-1757   MySQL Server    MySQL Protocol  InnoDB                  No      
4.0     Network         Low     Single  None  None  Partial+  5.5.23 and 
earlier   
CVE-2012-1756   MySQL Server    MySQL Protocol  Server                  No      
4.0     Network         Low     Single  None  None  Partial+  5.5.23 and 
earlier    
CVE-2012-1734   MySQL Server    MySQL Protocol  Server Optimizer        No      
4.0     Network         Low     Single  None  None  Partial+  5.1.62 and 
earlier, 5.5.23 and earlier   
CVE-2012-1689   MySQL Server    MySQL Protocol  Server Optimizer        No      
4.0     Network         Low     Single  None  None  Partial+  5.1.62 and 
earlier, 5.5.22 and earlier    

The advisory is confusing, I'm not sure which upstream version fixes these
issues. I'm afraid we'll have to update to a new upstream, though.

Maybe we can switch to a FLOSS-friendly fork like mariadb after Wheezy
release...

Cheers,
        Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to