ID CVE-2013-3839
Summary Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
References
Vulnerable Configurations
  • Oracle MySQL 5.5.32
    cpe:2.3:a:oracle:mysql:5.5.32
  • Oracle MySQL 5.5.10
    cpe:2.3:a:oracle:mysql:5.5.10
  • Oracle MySQL 5.5.11
    cpe:2.3:a:oracle:mysql:5.5.11
  • Oracle MySQL 5.5.12
    cpe:2.3:a:oracle:mysql:5.5.12
  • Oracle MySQL 5.5.13
    cpe:2.3:a:oracle:mysql:5.5.13
  • Oracle MySQL 5.5.14
    cpe:2.3:a:oracle:mysql:5.5.14
  • Oracle MySQL 5.5.15
    cpe:2.3:a:oracle:mysql:5.5.15
  • Oracle MySQL 5.5.16
    cpe:2.3:a:oracle:mysql:5.5.16
  • Oracle MySQL 5.5.17
    cpe:2.3:a:oracle:mysql:5.5.17
  • Oracle MySQL 5.5.18
    cpe:2.3:a:oracle:mysql:5.5.18
  • Oracle MySQL 5.5.19
    cpe:2.3:a:oracle:mysql:5.5.19
  • Oracle MySQL 5.5.20
    cpe:2.3:a:oracle:mysql:5.5.20
  • Oracle MySQL 5.5.21
    cpe:2.3:a:oracle:mysql:5.5.21
  • Oracle MySQL 5.5.22
    cpe:2.3:a:oracle:mysql:5.5.22
  • Oracle MySQL 5.5.23
    cpe:2.3:a:oracle:mysql:5.5.23
  • Oracle MySQL 5.5.24
    cpe:2.3:a:oracle:mysql:5.5.24
  • Oracle MySQL 5.5.25
    cpe:2.3:a:oracle:mysql:5.5.25
  • Oracle MySQL 5.5.25a
    cpe:2.3:a:oracle:mysql:5.5.25:a
  • Oracle MySQL 5.5.26
    cpe:2.3:a:oracle:mysql:5.5.26
  • Oracle MySQL 5.5.27
    cpe:2.3:a:oracle:mysql:5.5.27
  • Oracle MySQL 5.5.28
    cpe:2.3:a:oracle:mysql:5.5.28
  • Oracle MySQL 5.5.29
    cpe:2.3:a:oracle:mysql:5.5.29
  • Oracle MySQL 5.5.30
    cpe:2.3:a:oracle:mysql:5.5.30
  • Oracle MySQL 5.5.31
    cpe:2.3:a:oracle:mysql:5.5.31
  • Oracle MySQL 5.6.12
    cpe:2.3:a:oracle:mysql:5.6.12
  • Oracle MySQL 5.6.0
    cpe:2.3:a:oracle:mysql:5.6.0
  • Oracle MySQL 5.6.1
    cpe:2.3:a:oracle:mysql:5.6.1
  • Oracle MySQL 5.6.10
    cpe:2.3:a:oracle:mysql:5.6.10
  • Oracle MySQL 5.6.11
    cpe:2.3:a:oracle:mysql:5.6.11
  • Oracle MySQL 5.6.2
    cpe:2.3:a:oracle:mysql:5.6.2
  • Oracle MySQL 5.6.3
    cpe:2.3:a:oracle:mysql:5.6.3
  • Oracle MySQL 5.6.4
    cpe:2.3:a:oracle:mysql:5.6.4
  • Oracle MySQL 5.6.5
    cpe:2.3:a:oracle:mysql:5.6.5
  • Oracle MySQL 5.6.6
    cpe:2.3:a:oracle:mysql:5.6.6
  • Oracle MySQL 5.6.7
    cpe:2.3:a:oracle:mysql:5.6.7
  • Oracle MySQL 5.6.8
    cpe:2.3:a:oracle:mysql:5.6.8
  • Oracle MySQL 5.6.9
    cpe:2.3:a:oracle:mysql:5.6.9
  • Oracle MySQL 5.1.70
    cpe:2.3:a:oracle:mysql:5.1.70
  • Oracle MySQL 5.1.69
    cpe:2.3:a:oracle:mysql:5.1.69
  • Oracle MySQL 5.1.68
    cpe:2.3:a:oracle:mysql:5.1.68
  • Oracle MySQL 5.1.67
    cpe:2.3:a:oracle:mysql:5.1.67
  • Oracle MySQL 5.1.66
    cpe:2.3:a:oracle:mysql:5.1.66
  • Oracle MySQL 5.1.65
    cpe:2.3:a:oracle:mysql:5.1.65
  • Oracle MySQL 5.1.64
    cpe:2.3:a:oracle:mysql:5.1.64
  • Oracle MySQL 5.1.63
    cpe:2.3:a:oracle:mysql:5.1.63
  • Oracle MySQL 5.1.62
    cpe:2.3:a:oracle:mysql:5.1.62
  • Oracle MySQL 5.1.61
    cpe:2.3:a:oracle:mysql:5.1.61
  • Oracle MySQL 5.1.60
    cpe:2.3:a:oracle:mysql:5.1.60
  • Oracle MySQL 5.1.59
    cpe:2.3:a:oracle:mysql:5.1.59
  • Oracle MySQL 5.1.58
    cpe:2.3:a:oracle:mysql:5.1.58
  • Oracle MySQL 5.1.57
    cpe:2.3:a:oracle:mysql:5.1.57
  • Oracle MySQL 5.1.56
    cpe:2.3:a:oracle:mysql:5.1.56
  • Oracle MySQL 5.1.55
    cpe:2.3:a:oracle:mysql:5.1.55
  • Oracle MySQL 5.1.54
    cpe:2.3:a:oracle:mysql:5.1.54
  • Oracle MySQL 5.1.53
    cpe:2.3:a:oracle:mysql:5.1.53
  • Oracle MySQL 5.1.52
    cpe:2.3:a:oracle:mysql:5.1.52
  • Oracle MySQL 5.1.51
    cpe:2.3:a:oracle:mysql:5.1.51
CVSS
Base: 4.0 (as of 16-10-2013 - 13:41)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE_INSTANCE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2013-240.NASL
    description Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 70902
    published 2013-11-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70902
    title Amazon Linux AMI : mysql51 (ALAS-2013-240)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-19601.NASL
    description Update to MySQL 5.5.34, for various fixes described at http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-34.html Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-20
    plugin id 70822
    published 2013-11-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70822
    title Fedora 20 : community-mysql-5.5.34-1.fc20 (2013-19601)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2780.NASL
    description This DSA updates the MySQL database to 5.1.72. This fixes multiple unspecified security problems in the Optimizer component: http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.h tml
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 70502
    published 2013-10-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70502
    title Debian DSA-2780-1 : mysql-5.1 - several vulnerabilities
  • NASL family Databases
    NASL id MYSQL_5_1_71.NASL
    description The version of MySQL 5.1 installed on the remote host is earlier than 5.1.71. It is, therefore, potentially affected by multiple denial of service vulnerabilities in the 'Server Optimizer' component. Note: Oracle has provided a workaround to address the issue for CVE-2012-2750.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 70461
    published 2013-10-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70461
    title MySQL 5.1 < 5.1.71 Server Optimizer Denial of Service
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-19648.NASL
    description Update to MySQL 5.5.34, for various fixes described at http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-34.html Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-20
    plugin id 70735
    published 2013-11-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70735
    title Fedora 18 : mysql-5.5.34-1.fc18 (2013-19648)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2006-1.NASL
    description Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.72 in Ubuntu 10.04 LTS. Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04 and Ubuntu 13.10 have been updated to MySQL 5.5.34. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-72.html http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-34.html http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.h tml. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 70606
    published 2013-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70606
    title Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.04 / 13.10 : mysql-5.5, mysql-dfsg-5.1 vulnerabilities (USN-2006-1)
  • NASL family Databases
    NASL id MYSQL_5_5_33.NASL
    description The version of MySQL 5.5 installed on the remote host is a version prior to 5.5.33. It is, therefore, potentially affected by vulnerabilities in the following components : - Server Optimizer - Server Replication
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 70462
    published 2013-10-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70462
    title MySQL 5.5 < 5.5.33 Multiple Vulnerabilities
  • NASL family Databases
    NASL id MYSQL_5_6_13.NASL
    description The version of MySQL installed on the remote host is 5.6.x older than 5.6.13. As such, it is reportedly affected by vulnerabilities in the following components : - InnoDB - Server Optimizer - Server Replication
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 70463
    published 2013-10-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70463
    title MySQL 5.6.x < 5.6.13 Multiple Vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-19654.NASL
    description Update to MySQL 5.5.34, for various fixes described at http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-34.html Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-20
    plugin id 70736
    published 2013-11-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70736
    title Fedora 19 : community-mysql-5.5.34-1.fc19 (2013-19654)
  • NASL family Junos Local Security Checks
    NASL id JUNIPER_SPACE_JSA10627.NASL
    description According to its self-reported version number, the remote Junos Space version is prior to 13.3R1.8. It is, therefore, affected by multiple vulnerabilities in bundled third party software components : - Multiple vulnerabilities in RedHat JBoss application server. (CVE-2010-0738, CVE-2010-1428, CVE-2010-1429, CVE-2011-5245, CVE-2012-0818) - Multiple vulnerabilities in Oracle Java SE JDK. (CVE-2012-3143, CVE-2013-1537, CVE-2013-1557, CVE-2013-2422) - Multiple vulnerabilities in Oracle MySQL server. (CVE-2013-1502, CVE-2013-1511, CVE-2013-1532, CVE-2013-1544, CVE-2013-2375, CVE-2013-2376, CVE-2013-2389, CVE-2013-2391, CVE-2013-2392, CVE-2013-3783, CVE-2013-3793, CVE-2013-3794, CVE-2013-3801, CVE-2013-3802, CVE-2013-3804, CVE-2013-3805, CVE-2013-3808, CVE-2013-3809, CVE-2013-3812, CVE-2013-3839) - Multiple vulnerabilities in Apache HTTP Server. (CVE-2013-1862, CVE-2013-1896) - Known hard-coded MySQL credentials. (CVE-2014-3413)
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 80195
    published 2014-12-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80195
    title Juniper Junos Space < 13.3R1.8 Multiple Vulnerabilities (JSA10627)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2818.NASL
    description Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.5.33, which includes additional changes, such as performance improvements, bug fixes, new features, and possibly incompatible changes. Please see the MySQL 5.5 Release Notes for further details : - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5- 32.html - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5- 33.html In addition this update fixes two issues affecting specifically the mysql-5.5 Debian package : A race condition in the post-installation script of the mysql-server-5.5 package creates the configuration file '/etc/mysql/debian.cnf' with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as credentials for the debian-sys-maint to perform administration tasks. (CVE-2013-2162 ) Matthias Reichl reported that the mysql-5.5 package misses the patches applied previous in Debian's mysql-5.1 to drop the database 'test' and the permissions that allow anonymous access, without a password, from localhost to the 'test' database and any databases starting with'test_'. This update reintroduces these patches for the mysql-5.5 package. Existing databases and permissions are not touched. Please refer to the NEWS file provided with this update for further information.
    last seen 2019-02-21
    modified 2018-11-19
    plugin id 71474
    published 2013-12-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=71474
    title Debian DSA-2818-1 : mysql-5.5 - several vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2014-0186.NASL
    description Updated mysql55-mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2013-5807, CVE-2013-5891, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437, CVE-2013-3839, CVE-2013-5908) A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client. (CVE-2014-0001) The CVE-2014-0001 issue was discovered by Garth Mollett of the Red Hat Security Response Team. These updated packages upgrade MySQL to version 5.5.36. Refer to the MySQL Release Notes listed in the References section for a complete list of changes. All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 72568
    published 2014-02-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72568
    title RHEL 5 : mysql55-mysql (RHSA-2014:0186)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201409-04.NASL
    description The remote host is affected by the vulnerability described in GLSA-201409-04 (MySQL: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in MySQL. Please review the CVE identifiers referenced below for details. Impact : A local attacker could possibly gain escalated privileges. A remote attacker could send a specially crafted SQL query, possibly resulting in a Denial of Service condition. A remote attacker could entice a user to connect to specially crafted MySQL server, possibly resulting in execution of arbitrary code with the privileges of the process. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 77548
    published 2014-09-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=77548
    title GLSA-201409-04 : MySQL: Multiple vulnerabilities
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2014-0186.NASL
    description Updated mysql55-mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2013-5807, CVE-2013-5891, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437, CVE-2013-3839, CVE-2013-5908) A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client. (CVE-2014-0001) The CVE-2014-0001 issue was discovered by Garth Mollett of the Red Hat Security Response Team. These updated packages upgrade MySQL to version 5.5.36. Refer to the MySQL Release Notes listed in the References section for a complete list of changes. All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 72592
    published 2014-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72592
    title CentOS 5 : mysql55-mysql (CESA-2014:0186)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2014-0173.NASL
    description The remote CentOS host is missing a security update which has been documented in Red Hat advisory RHSA-2014:0173.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 72863
    published 2014-03-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72863
    title CentOS 6 : mysql55-mysql (CESA-2014:0173)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2014-0189.NASL
    description The remote CentOS host is missing a security update which has been documented in Red Hat advisory RHSA-2014:0189.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 72864
    published 2014-03-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72864
    title CentOS 6 : mariadb55-mariadb (CESA-2014:0189)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2014-0186.NASL
    description From Red Hat Security Advisory 2014:0186 : Updated mysql55-mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2013-5807, CVE-2013-5891, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437, CVE-2013-3839, CVE-2013-5908) A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client. (CVE-2014-0001) The CVE-2014-0001 issue was discovered by Garth Mollett of the Red Hat Security Response Team. These updated packages upgrade MySQL to version 5.5.36. Refer to the MySQL Release Notes listed in the References section for a complete list of changes. All MySQL users should upgrade to these updated packages, which correct these issues. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 72566
    published 2014-02-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72566
    title Oracle Linux 5 : mysql55-mysql (ELSA-2014-0186)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20140218_MYSQL55_MYSQL_ON_SL5_X.NASL
    description A buffer overflow flaw was found in the way the MySQL command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MySQL server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client. (CVE-2014-0001) Upstream does not issue any more security advisories for the MySQL 5.0 packages (mysql-5.0.* and related packages). The only trusted way to upgrade from MySQL 5.0 to MySQL 5.5 is by using MySQL 5.1 as an intermediate step. This is why the mysql51* Software Collection packages are provided. Note that the MySQL 5.1 packages are not supported and are provided only for the purposes of migrating to MySQL 5.5. You should not use the mysql51* packages on any of your production systems. Specific instructions for this migration are provided by the upstream Deployment Guide. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 72569
    published 2014-02-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72569
    title Scientific Linux Security Update : mysql55-mysql on SL5.x i386/x86_64
redhat via4
advisories
  • bugzilla
    id 904061
    title missing logrotate script
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment mysql is earlier than 0:5.1.71-1.el6
          oval oval:com.redhat.rhba:tst:20131647005
        • comment mysql is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20131647006
      • AND
        • comment mysql-bench is earlier than 0:5.1.71-1.el6
          oval oval:com.redhat.rhba:tst:20131647019
        • comment mysql-bench is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20131647020
      • AND
        • comment mysql-devel is earlier than 0:5.1.71-1.el6
          oval oval:com.redhat.rhba:tst:20131647007
        • comment mysql-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20131647008
      • AND
        • comment mysql-embedded is earlier than 0:5.1.71-1.el6
          oval oval:com.redhat.rhba:tst:20131647011
        • comment mysql-embedded is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20131647012
      • AND
        • comment mysql-embedded-devel is earlier than 0:5.1.71-1.el6
          oval oval:com.redhat.rhba:tst:20131647013
        • comment mysql-embedded-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20131647014
      • AND
        • comment mysql-libs is earlier than 0:5.1.71-1.el6
          oval oval:com.redhat.rhba:tst:20131647009
        • comment mysql-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20131647010
      • AND
        • comment mysql-server is earlier than 0:5.1.71-1.el6
          oval oval:com.redhat.rhba:tst:20131647017
        • comment mysql-server is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20131647018
      • AND
        • comment mysql-test is earlier than 0:5.1.71-1.el6
          oval oval:com.redhat.rhba:tst:20131647015
        • comment mysql-test is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20131647016
    rhsa
    released 2013-11-20
    severity None
    title RHBA-2013:1647: mysql bug fix update (None)
  • rhsa
    id RHSA-2014:0173
  • rhsa
    id RHSA-2014:0186
  • rhsa
    id RHSA-2014:0189
rpms
  • mysql-0:5.1.71-1.el6
  • mysql-bench-0:5.1.71-1.el6
  • mysql-devel-0:5.1.71-1.el6
  • mysql-embedded-0:5.1.71-1.el6
  • mysql-embedded-devel-0:5.1.71-1.el6
  • mysql-libs-0:5.1.71-1.el6
  • mysql-server-0:5.1.71-1.el6
  • mysql-test-0:5.1.71-1.el6
  • mysql55-mysql-0:5.5.36-2.el5
  • mysql55-mysql-bench-0:5.5.36-2.el5
  • mysql55-mysql-devel-0:5.5.36-2.el5
  • mysql55-mysql-libs-0:5.5.36-2.el5
  • mysql55-mysql-server-0:5.5.36-2.el5
  • mysql55-mysql-test-0:5.5.36-2.el5
refmap via4
bid 63109
confirm http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
debian
  • DSA-2780
  • DSA-2818
gentoo GLSA-201409-04
mandriva MDVSA-2013:250
sectrack 1029184
secunia 55291
ubuntu USN-2006-1
Last major update 06-01-2017 - 21:59
Published 16-10-2013 - 11:55
Back to Top