mysql was updated to version 5.5.49 to fix 13 security issues.
These security issues were fixed: - CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#976341). - CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#976341). - CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#976341). - CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#976341). - CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#976341). - CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#976341). - CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#976341). - CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#976341). - CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#976341). - CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#976341). - CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341). - CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341). - CVE-2016-2047: The sslverifyserver_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).
More details are available at - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html
{ "binaries": [ { "libmysql55client_r18-x86": "5.5.49-0.20.1", "libmysql55client18-32bit": "5.5.49-0.20.1", "libmysql55client18-x86": "5.5.49-0.20.1", "mysql": "5.5.49-0.20.1", "mysql-client": "5.5.49-0.20.1", "mysql-tools": "5.5.49-0.20.1", "libmysql55client18": "5.5.49-0.20.1", "libmysql55client_r18-32bit": "5.5.49-0.20.1", "libmysql55client_r18": "5.5.49-0.20.1" } ] }
{ "binaries": [ { "libmysql55client_r18-x86": "5.5.49-0.20.1", "libmysql55client18-32bit": "5.5.49-0.20.1", "libmysql55client18-x86": "5.5.49-0.20.1", "mysql": "5.5.49-0.20.1", "mysql-client": "5.5.49-0.20.1", "mysql-tools": "5.5.49-0.20.1", "libmysql55client18": "5.5.49-0.20.1", "libmysql55client_r18-32bit": "5.5.49-0.20.1", "libmysql55client_r18": "5.5.49-0.20.1" } ] }