Risks
Advisories
Browse
or
or
Slackware Security Advisory - mysql (SSA:2013-022-01)
[slackware-security]  mysql (SSA:2013-022-01)

New mysql packages are available for 12.1, 12.2, 13.0, 13.1, 13.37, 14.0,
and -current to fix security and other issues.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/mysql-5.5.29-i486-1_slack14.0.txz:  Upgraded.
  Upgraded to the latest upstream version to fix security issues and provide
  other bug fixes and improvements.  Note that some of the changes may
  possibly introduce incompatibilities with the previous package.
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/mysql-5.0.96-i4
86-1_slack12.1.tgz

Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/mysql-5.0.96-i4
86-1_slack12.2.tgz

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/mysql-5.0.96-i4
86-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/mysql-5.0.96-
x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/mysql-5.1.67-i4
86-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/mysql-5.1.67-
x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/mysql-5.1.67-i
486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/mysql-5.1.67
-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/mysql-5.5.29-i4
86-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/mysql-5.5.29-
x86_64-1_slack14.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/mysql-5.5.29-i48
6-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/mysql-5.5.29
-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 12.1 package:
f75865b3611efb8557cea96565449a93  mysql-5.0.96-i486-1_slack12.1.tgz

Slackware 12.2 package:
3571bb2c013f00e3300f6ca4930aae4e  mysql-5.0.96-i486-1_slack12.2.tgz

Slackware 13.0 package:
8e7b85375315398c3bc34dd81a598836  mysql-5.0.96-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
a0a6ed684630b71cc62dddd7b1434ff0  mysql-5.0.96-x86_64-1_slack13.0.txz

Slackware 13.1 package:
a9b5e47c29f8f55e53a9cfe305ad4b25  mysql-5.1.67-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
8638655eef73c0758a2bf7733b098c81  mysql-5.1.67-x86_64-1_slack13.1.txz

Slackware 13.37 package:
d5256a403a7a8af68571a62dec01ed4f  mysql-5.1.67-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
4a4b8c5c882ae9f382638a992405b406  mysql-5.1.67-x86_64-1_slack13.37.txz

Slackware 14.0 package:
a9495210b5e9beb10ff7fd7a6dc17aa1  mysql-5.5.29-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
4cd936a43cf29d7799f569ee7aa91f6c  mysql-5.5.29-x86_64-1_slack14.0.txz

Slackware -current package:
dbab477a8735511c4a17f16acea5e177  ap/mysql-5.5.29-i486-1.txz

Slackware x86_64 -current package:
74b13dd8b8c40fc53d1218db4aeb4d95  ap/mysql-5.5.29-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg mysql-5.5.29-i486-1_slack14.0.txz

Then, restart the database server:
# sh /etc/rc.d/rc.mysqld restart


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com




Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //