—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2015:227
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : mariadb
Date : May 5, 2015
Affected: Business Server 1.0, Business Server 2.0
_______________________________________________________________________
Problem Description:
This update provides MariaDB 5.5.43, which fixes several security
issues and other bugs. Please refer to the Oracle Critical Patch Update
Advisories and the Release Notes for MariaDB for further information
regarding the security vulnerabilities.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html#AppendixMSQL
https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
41adf37b32152b829790e023c8f363f4 mbs1/x86_64/lib64mariadb18-5.5.43-1.mbs1.x86_64.rpm
44949eb68781250d9a8be80ff9668135 mbs1/x86_64/lib64mariadb-devel-5.5.43-1.mbs1.x86_64.rpm
4d85ef160d35c48ef06b3a71606e36a7 mbs1/x86_64/lib64mariadb-embedded18-5.5.43-1.mbs1.x86_64.rpm
123fc83391fe403c6c5d176750c32770 mbs1/x86_64/lib64mariadb-embedded-devel-5.5.43-1.mbs1.x86_64.rpm
5a527b126a8f91044f4e87772eb5e8e0 mbs1/x86_64/mariadb-5.5.43-1.mbs1.x86_64.rpm
1652a43b00dc6a2174073a3960b15cc8 mbs1/x86_64/mariadb-bench-5.5.43-1.mbs1.x86_64.rpm
9ab40cef421fab0839f76225b18340e5 mbs1/x86_64/mariadb-client-5.5.43-1.mbs1.x86_64.rpm
fff064f4f3b66e20e8ce129c206884aa mbs1/x86_64/mariadb-common-5.5.43-1.mbs1.x86_64.rpm
ab667c73309bead995b50d6e5b05800a mbs1/x86_64/mariadb-common-core-5.5.43-1.mbs1.x86_64.rpm
3f31d5c3f116a7cddd948c80d7a072d9 mbs1/x86_64/mariadb-core-5.5.43-1.mbs1.x86_64.rpm
a631e46a27ee5ef66e2d0190d94a5555 mbs1/x86_64/mariadb-extra-5.5.43-1.mbs1.x86_64.rpm
2e1ef1a4450351adf7cae18ce2d88ca3 mbs1/x86_64/mariadb-feedback-5.5.43-1.mbs1.x86_64.rpm
a5149b9948665badd86a2b0a7aa29319 mbs1/x86_64/mariadb-obsolete-5.5.43-1.mbs1.x86_64.rpm
ddbc659c9b87028f55c221e2f9a6095f mbs1/x86_64/mysql-MariaDB-5.5.43-1.mbs1.x86_64.rpm
ecb27cdffb1e8647452d123df8d9c701 mbs1/SRPMS/mariadb-5.5.43-1.mbs1.src.rpm
Mandriva Business Server 2/X86_64:
8ca8de623ff449e031ffd903a95c0ed3 mbs2/x86_64/lib64mariadb18-5.5.43-1.mbs2.x86_64.rpm
bc5779b22ab28c7d1f9c0b224d787a06 mbs2/x86_64/lib64mariadb-devel-5.5.43-1.mbs2.x86_64.rpm
c4bf1248e6aacee5e006a6510f655a33 mbs2/x86_64/lib64mariadb-embedded18-5.5.43-1.mbs2.x86_64.rpm
0a5d523b752306e8cf698515a4187b95 mbs2/x86_64/lib64mariadb-embedded-devel-5.5.43-1.mbs2.x86_64.rpm
a5e35ab2959a7631f444d096fee2219c mbs2/x86_64/mariadb-5.5.43-1.mbs2.x86_64.rpm
bff2d9a3f72d4f3c7642cf8d77500640 mbs2/x86_64/mariadb-bench-5.5.43-1.mbs2.x86_64.rpm
a70f354bb532206858f110e529b37d9e mbs2/x86_64/mariadb-client-5.5.43-1.mbs2.x86_64.rpm
eb8f8e0f54c822a44e370dc80534d56e mbs2/x86_64/mariadb-common-5.5.43-1.mbs2.x86_64.rpm
ffa532e9a0acdd84145a481aac247860 mbs2/x86_64/mariadb-common-core-5.5.43-1.mbs2.x86_64.rpm
852f017e64ec8c83f821d71ee9674304 mbs2/x86_64/mariadb-core-5.5.43-1.mbs2.x86_64.rpm
8e7e19f919167ade0bd1c1cc597bc88f mbs2/x86_64/mariadb-extra-5.5.43-1.mbs2.x86_64.rpm
e721c9a39f588c8f7718ade393f20d2c mbs2/x86_64/mariadb-feedback-5.5.43-1.mbs2.x86_64.rpm
c0d545149d194e8dddf4aae8df110105 mbs2/x86_64/mariadb-obsolete-5.5.43-1.mbs2.x86_64.rpm
5e95431b6646ab832cb9f97947e75b1d mbs2/x86_64/mysql-MariaDB-5.5.43-1.mbs2.x86_64.rpm
916b3d93b0c161d8dca95a0106c08e53 mbs2/SRPMS/mariadb-5.5.43-1.mbs2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFVSKcbmqjQ0CJFipgRAjfdAJ4xRHxcEqpcBCUF+uVUXGIDpKpluACg1g2v
iipB5199xtKopQzhD/EIn1Y=
=fJFa
—–END PGP SIGNATURE—–
To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________