ALAS-2016-701


Amazon Linux AMI Security Advisory: ALAS-2016-701
Advisory Release Date: 2016-05-18 14:00 Pacific
Severity: Critical

Issue Overview:

A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash. (CVE-2016-0705 )

The ssl_verify_server_cert function in sql-common/client.c in Oracle MySQL 5.6.29 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com". (CVE-2016-2047 )

Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication. (CVE-2016-0639 )

Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect availability via vectors related to FTS. (CVE-2016-0647 )

Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect integrity and availability via vectors related to Federated. (CVE-2016-0642 )

Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect confidentiality via vectors related to DML. (CVE-2016-0643 )

Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect availability via vectors related to Security: Privileges. (CVE-2016-0666 )

Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect availability via vectors related to PS. (CVE-2016-0648 )

Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect availability via vectors related to InnoDB. (CVE-2016-0655 )


Affected Packages:

mysql56


Issue Correction:
Run yum update mysql56 to update your system.

New Packages:
i686:
    mysql56-embedded-5.6.30-1.15.amzn1.i686
    mysql56-test-5.6.30-1.15.amzn1.i686
    mysql56-errmsg-5.6.30-1.15.amzn1.i686
    mysql56-devel-5.6.30-1.15.amzn1.i686
    mysql56-5.6.30-1.15.amzn1.i686
    mysql56-server-5.6.30-1.15.amzn1.i686
    mysql56-debuginfo-5.6.30-1.15.amzn1.i686
    mysql56-libs-5.6.30-1.15.amzn1.i686
    mysql56-common-5.6.30-1.15.amzn1.i686
    mysql56-embedded-devel-5.6.30-1.15.amzn1.i686
    mysql56-bench-5.6.30-1.15.amzn1.i686

src:
    mysql56-5.6.30-1.15.amzn1.src

x86_64:
    mysql56-libs-5.6.30-1.15.amzn1.x86_64
    mysql56-5.6.30-1.15.amzn1.x86_64
    mysql56-devel-5.6.30-1.15.amzn1.x86_64
    mysql56-embedded-5.6.30-1.15.amzn1.x86_64
    mysql56-test-5.6.30-1.15.amzn1.x86_64
    mysql56-embedded-devel-5.6.30-1.15.amzn1.x86_64
    mysql56-debuginfo-5.6.30-1.15.amzn1.x86_64
    mysql56-bench-5.6.30-1.15.amzn1.x86_64
    mysql56-common-5.6.30-1.15.amzn1.x86_64
    mysql56-server-5.6.30-1.15.amzn1.x86_64
    mysql56-errmsg-5.6.30-1.15.amzn1.x86_64