File _patchinfo of Package patchinfo

<patchinfo incident="8515">
  <issue tracker="bnc" id="1087102"></issue>
  <issue tracker="bnc" id="1088681"></issue>
  <issue tracker="bnc" id="1101680"></issue>
  <issue tracker="bnc" id="1101679"></issue>
  <issue tracker="bnc" id="1101678"></issue>
  <issue tracker="bnc" id="1101676"></issue>
  <issue tracker="bnc" id="1103342"></issue>
  <issue tracker="bnc" id="1103344"></issue>
  <issue tracker="cve" id="2018-0739"/>
  <issue tracker="cve" id="2018-3058"/>
  <issue tracker="cve" id="2018-2767"/>
  <issue tracker="cve" id="2018-3081"/>
  <issue tracker="cve" id="2018-3064"/>
  <issue tracker="cve" id="2018-3066"/>
  <issue tracker="cve" id="2018-3070"/>
  <issue tracker="cve" id="2018-3062"/>
  <category>security</category>
  <rating>moderate</rating>
  <packager>kstreitova</packager>
  <description>This update for mysql-community-server to version 5.6.41 fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-3064: Fixed an easily exploitable vulnerability that allowed a low
  privileged attacker with network access via multiple protocols to compromise
  the MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server as well as unauthorized update, insert or
  delete access to some of MySQL Server accessible data. (bsc#1103342)

- CVE-2018-3070: Fixed an easily exploitable vulnerability that allowed a low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101679)

- CVE-2018-0739: Fixed a stack exhaustion in case of recursively constructed
  ASN.1 types. (boo#1087102)

- CVE-2018-3062: Fixed a difficult to exploit vulnerability that allowed
  low privileged attacker with network access via memcached to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1103344)

- CVE-2018-3081: Fixed a difficult to exploit vulnerability that allowed
  high privileged attacker with network access via multiple protocols to
  compromise MySQL Client. Successful attacks of this vulnerability can result
  in unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Client as well as unauthorized update, insert or
  delete access to some of MySQL Client accessible data. (bsc#1101680)

- CVE-2018-3058: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data. (bsc#1101676)

- CVE-2018-3066: Fixed a difficult to exploit vulnerability allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data as well as unauthorized read access to a subset of MySQL
  Server accessible data. (bsc#1101678)

- CVE-2018-2767: Fixed a difficult to exploit vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized read access to a subset of MySQL Server accessible data.
  (boo#1088681)

You can find more detailed information about this update in the
[release notes](http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-41.html)
</description>
  <summary>Security update for mysql-community-server</summary>
</patchinfo>
openSUSE Build Service is sponsored by