SUSE SLED11 / SLES11 安全更新:MySQL (SUSE-SU-2015:0946-1) (FREAK)

medium Nessus 插件 ID 83860

简介

远程 SUSE 主机缺少一个或多个安全更新。

描述

MySQL 已更新到版本 5.5.43,修复了多个安全问题和非安全问题:

已修复的 CVE:CVE-2014-3569、CVE-2014-3570、CVE-2014-3571、CVE-2014-3572、CVE-2014-8275、CVE-2015-0204、CVE-2015-0205、CVE-2015-0206、CVE-2015-0405、CVE-2015-0423、CVE-2015-0433、CVE-2015-0438、CVE-2015-0439、CVE-2015-0441、CVE-2015-0498、CVE-2015-0499、CVE-2015-0500、CVE-2015-0501、CVE-2015-0503、CVE-2015-0505、CVE-2015-0506、CVE-2015-0507、CVE-2015-0508、CVE-2015-0511、CVE-2015-2566、CVE-2015-2567、CVE-2015-2568、CVE-2015-2571、CVE-2015-2573、CVE-2015-2576。

修复超长模式字符串的 regcomp(Henry Spencer 的 regex 库)中的整数溢出。(bnc#922043,CVE-2015-2305)

有关全面的变更列表,请参阅 <a href='http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-43.html' >http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-43.html</a>。

请注意,Tenable Network Security 已直接从 SUSE 安全公告中提取上述描述块。Tenable 已尝试在不引入其他问题的情况下尽可能进行了自动整理和排版。

解决方案

请使用 YaST online_update 安装此 SUSE 安全更新。
或者,可以运行为产品列出的命令:

SUSE Linux Enterprise 软件开发工具包 11 SP3:

zypper in -t patch sdksp3-libmysql55client18=10661

SUSE Linux Enterprise Server 11 SP3 for VMware:

zypper in -t patch slessp3-libmysql55client18=10661

SUSE Linux Enterprise Server 11 SP3:

zypper in -t patch slessp3-libmysql55client18=10661

SUSE Linux Enterprise Desktop 11 SP3:

zypper in -t patch sledsp3-libmysql55client18=10661

要使系统保持最新状态,请使用“zypper 修补程序”。

另见

https://www.suse.com/security/cve/CVE-2015-0433/

https://www.suse.com/security/cve/CVE-2015-0438/

https://www.suse.com/security/cve/CVE-2015-0439/

https://www.suse.com/security/cve/CVE-2015-0441/

https://www.suse.com/security/cve/CVE-2015-0498/

https://www.suse.com/security/cve/CVE-2015-0499/

https://www.suse.com/security/cve/CVE-2015-0500/

https://www.suse.com/security/cve/CVE-2015-0501/

https://www.suse.com/security/cve/CVE-2015-0503/

https://www.suse.com/security/cve/CVE-2015-0505/

https://www.suse.com/security/cve/CVE-2015-0506/

https://www.suse.com/security/cve/CVE-2015-0507/

https://www.suse.com/security/cve/CVE-2015-0508/

https://www.suse.com/security/cve/CVE-2015-0511/

https://www.suse.com/security/cve/CVE-2015-2305/

https://www.suse.com/security/cve/CVE-2015-2566/

https://www.suse.com/security/cve/CVE-2015-2567/

https://www.suse.com/security/cve/CVE-2015-2568/

https://www.suse.com/security/cve/CVE-2015-2571/

https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-43.html

https://bugzilla.suse.com/show_bug.cgi?id=922043

https://bugzilla.suse.com/show_bug.cgi?id=927623

http://www.nessus.org/u?dca0dc5f

https://www.suse.com/security/cve/CVE-2014-3569/

https://www.suse.com/security/cve/CVE-2014-3570/

https://www.suse.com/security/cve/CVE-2014-3571/

https://www.suse.com/security/cve/CVE-2014-3572/

https://www.suse.com/security/cve/CVE-2014-8275/

https://www.suse.com/security/cve/CVE-2015-0204/

https://www.suse.com/security/cve/CVE-2015-0205/

https://www.suse.com/security/cve/CVE-2015-0206/

https://www.suse.com/security/cve/CVE-2015-0405/

https://www.suse.com/security/cve/CVE-2015-0423/

https://www.suse.com/security/cve/CVE-2015-2573/

https://www.suse.com/security/cve/CVE-2015-2576/

http://www.nessus.org/u?46419ceb

插件详情

严重性: Medium

ID: 83860

文件名: suse_SU-2015-0946-1.nasl

版本: 2.23

类型: local

代理: unix

发布时间: 2015/5/27

最近更新时间: 2021/1/6

支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: Medium

基本分数: 6.8

时间分数: 5

矢量: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

漏洞信息

CPE: p-cpe:/a:novell:suse_linux:libmysql55client18, p-cpe:/a:novell:suse_linux:libmysql55client_r18, p-cpe:/a:novell:suse_linux:libmysqlclient15, p-cpe:/a:novell:suse_linux:libmysqlclient_r15, p-cpe:/a:novell:suse_linux:mysql, p-cpe:/a:novell:suse_linux:mysql-client, p-cpe:/a:novell:suse_linux:mysql-tools, cpe:/o:novell:suse_linux:11

必需的 KB 项: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

易利用性: No known exploits are available

补丁发布日期: 2015/5/26

漏洞发布日期: 2014/12/24

参考资料信息

CVE: CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206, CVE-2015-0405, CVE-2015-0423, CVE-2015-0433, CVE-2015-0438, CVE-2015-0439, CVE-2015-0441, CVE-2015-0498, CVE-2015-0499, CVE-2015-0500, CVE-2015-0501, CVE-2015-0503, CVE-2015-0505, CVE-2015-0506, CVE-2015-0507, CVE-2015-0508, CVE-2015-0511, CVE-2015-2305, CVE-2015-2566, CVE-2015-2567, CVE-2015-2568, CVE-2015-2571, CVE-2015-2573, CVE-2015-2576

BID: 71935, 71936, 71937, 71939, 71940, 74086, 74089, 74091, 74095, 74098, 74102, 74103, 74107, 74110, 74112, 74115, 74120, 74121, 71934, 71941, 71942, 72611, 74070, 74073, 74078, 74081, 74085, 74123, 74126, 74130, 74133, 74137, 75769