{"affected":[{"ecosystem_specific":{"binaries":[{"libmysql55client_r18-32bit":"5.5.49-0.20.1","libmysql55client_r18-x86":"5.5.49-0.20.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"mysql","purl":"pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.49-0.20.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libmysql55client18":"5.5.49-0.20.1","libmysql55client18-32bit":"5.5.49-0.20.1","libmysql55client18-x86":"5.5.49-0.20.1","libmysql55client_r18":"5.5.49-0.20.1","libmysql55client_r18-32bit":"5.5.49-0.20.1","libmysql55client_r18-x86":"5.5.49-0.20.1","mysql":"5.5.49-0.20.1","mysql-client":"5.5.49-0.20.1","mysql-tools":"5.5.49-0.20.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"mysql","purl":"pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.49-0.20.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libmysql55client18":"5.5.49-0.20.1","libmysql55client18-32bit":"5.5.49-0.20.1","libmysql55client18-x86":"5.5.49-0.20.1","libmysql55client_r18":"5.5.49-0.20.1","libmysql55client_r18-32bit":"5.5.49-0.20.1","libmysql55client_r18-x86":"5.5.49-0.20.1","mysql":"5.5.49-0.20.1","mysql-client":"5.5.49-0.20.1","mysql-tools":"5.5.49-0.20.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"mysql","purl":"pkg:rpm/suse/mysql&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.49-0.20.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"mysql was updated to version 5.5.49 to fix 13 security issues.\n\nThese security issues were fixed:\n- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#976341).\n- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#976341).\n- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#976341).\n- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#976341).\n- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#976341).\n- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#976341).\n- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#976341).\n- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#976341).\n- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#976341).\n- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#976341).\n- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).\n- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).\n- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).\n\nMore details are available at\n- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html\n- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html\n","id":"SUSE-SU-2016:1279-1","modified":"2016-05-11T12:39:19Z","published":"2016-05-11T12:39:19Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20161279-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/963806"},{"type":"REPORT","url":"https://bugzilla.suse.com/976341"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0640"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0642"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0643"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0647"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0649"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0651"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0666"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2047"}],"related":["CVE-2016-0640","CVE-2016-0641","CVE-2016-0642","CVE-2016-0643","CVE-2016-0644","CVE-2016-0646","CVE-2016-0647","CVE-2016-0648","CVE-2016-0649","CVE-2016-0650","CVE-2016-0651","CVE-2016-0666","CVE-2016-2047"],"summary":"Security update for mysql","upstream":["CVE-2016-0640","CVE-2016-0641","CVE-2016-0642","CVE-2016-0643","CVE-2016-0644","CVE-2016-0646","CVE-2016-0647","CVE-2016-0648","CVE-2016-0649","CVE-2016-0650","CVE-2016-0651","CVE-2016-0666","CVE-2016-2047"]}