Amazon Linux 1 Security Advisory: ALAS-2016-701
Advisory Release Date: 2016-05-18 14:00 Pacific
Advisory Updated Date: 2016-05-18 14:00 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash. (CVE-2016-0705)
The ssl_verify_server_cert function in sql-common/client.c in Oracle MySQL 5.6.29 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com". (CVE-2016-2047)
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication. (CVE-2016-0639)
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect availability via vectors related to FTS. (CVE-2016-0647)
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect integrity and availability via vectors related to Federated. (CVE-2016-0642)
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect confidentiality via vectors related to DML. (CVE-2016-0643)
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect availability via vectors related to Security: Privileges. (CVE-2016-0666)
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect availability via vectors related to PS. (CVE-2016-0648)
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier allows local users to affect availability via vectors related to InnoDB. (CVE-2016-0655)
Affected Packages:
mysql56
Issue Correction:
Run yum update mysql56 to update your system.
i686:
mysql56-embedded-5.6.30-1.15.amzn1.i686
mysql56-test-5.6.30-1.15.amzn1.i686
mysql56-errmsg-5.6.30-1.15.amzn1.i686
mysql56-devel-5.6.30-1.15.amzn1.i686
mysql56-5.6.30-1.15.amzn1.i686
mysql56-server-5.6.30-1.15.amzn1.i686
mysql56-debuginfo-5.6.30-1.15.amzn1.i686
mysql56-libs-5.6.30-1.15.amzn1.i686
mysql56-common-5.6.30-1.15.amzn1.i686
mysql56-embedded-devel-5.6.30-1.15.amzn1.i686
mysql56-bench-5.6.30-1.15.amzn1.i686
src:
mysql56-5.6.30-1.15.amzn1.src
x86_64:
mysql56-libs-5.6.30-1.15.amzn1.x86_64
mysql56-5.6.30-1.15.amzn1.x86_64
mysql56-devel-5.6.30-1.15.amzn1.x86_64
mysql56-embedded-5.6.30-1.15.amzn1.x86_64
mysql56-test-5.6.30-1.15.amzn1.x86_64
mysql56-embedded-devel-5.6.30-1.15.amzn1.x86_64
mysql56-debuginfo-5.6.30-1.15.amzn1.x86_64
mysql56-bench-5.6.30-1.15.amzn1.x86_64
mysql56-common-5.6.30-1.15.amzn1.x86_64
mysql56-server-5.6.30-1.15.amzn1.x86_64
mysql56-errmsg-5.6.30-1.15.amzn1.x86_64