[prev in list] [next in list] [prev in thread] [next in thread] 

List:       debian-security-announce
Subject:    [SECURITY] [DSA 2429-1] mysql-5.1 security update
From:       Florian Weimer <fw () deneb ! enyo ! de>
Date:       2012-03-07 20:44:22
Message-ID: 87boo8p2e1.fsf () mid ! deneb ! enyo ! de
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2429-1                   security@debian.org
http://www.debian.org/security/                            Florian Weimer
March 07, 2012                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mysql-5.1
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2011-2262 CVE-2012-0075 CVE-2012-0087 CVE-2012-0101
    	         CVE-2012-0102 CVE-2012-0112 CVE-2012-0113 CVE-2012-0114
		 CVE-2012-0115 CVE-2012-0116 CVE-2012-0118 CVE-2012-0119
		 CVE-2012-0120 CVE-2012-0484 CVE-2012-0485 CVE-2012-0490
		 CVE-2012-0492
Debian Bug     : 659687

Several security vulnerabilities were discovered in MySQL, a database
management system.  The vulnerabilities are addressed by upgrading
MySQL to a new upstream version, 5.1.61, which includes additional
changes, such as performance improvements and corrections for data
loss defects.  These changes are described in the MySQL release notes
at: http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html

For the stable distribution (squeeze), these problems have been fixed
in version 5.1.61-0+squeeze1.

For the unstable distribution (sid), these problems have been fixed in
version 5.1.61-2.

We recommend that you upgrade your mysql-5.1 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJPV8DTAAoJEL97/wQC1SS+L24H/15Ovi05XFuAcy4dQpLfOWr4
3pjA6p03aaWBKeqW0DoQ+768MoShxjKiSA2ERXByX0AiKUXxLu6YG5sNohiOjOEP
NqO84Jq+gmpiQdiWhMqOsEj61JEXvncRtKvo8N6QnJ9j+y+MR2ja2KjNtEeGyUr1
yc8ubMgS7mbqxZKK3+cStZwChRPy8p6f+/nplHfyL9AgCkJDjTjNhoZrZ21aSfeu
eC6zzvWAiFWkHxNqM+HQBURPedbyEIJDNf25fMkMIzuqeLDfIoC3ATwpZHCE2mxq
fLRH7Bp4cpHNBAjDpwuOqkYuAduj1fL5+oBmw/zkpHBp5oHrBpnTZ2zULJ062Tg=
=mr98
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/87boo8p2e1.fsf@mid.deneb.enyo.de

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic