Jag känner inte igen användarnamnet så jag tror inte att jag är den
slyldige.

Best regards,

Håkan Lund | Server Administrator

Freespee Mail   | [email protected]
Freespee Voice | +46770350047

freespee.com - When Advertising is just math, we make sure no data is
missing


On Thu, Jan 23, 2014 at 4:37 PM, Salvatore Bonaccorso <[email protected]>wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-2848-1                   [email protected]
> http://www.debian.org/security/                      Salvatore Bonaccorso
> January 23, 2014                       http://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package        : mysql-5.5
> Vulnerability  : several
> Problem type   : remote
> Debian-specific: no
> CVE ID         : CVE-2013-5891 CVE-2013-5908 CVE-2014-0386 CVE-2014-0393
>                  CVE-2014-0401 CVE-2014-0402 CVE-2014-0412 CVE-2014-0420
>                  CVE-2014-0437
>
> Several issues have been discovered in the MySQL database server. The
> vulnerabilities are addressed by upgrading MySQL to the new upstream
> version 5.5.35. Please see the MySQL 5.5 Release Notes and Oracle's
> Critical Patch Update advisory for further details:
>
>  http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-34.html
>  http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-35.html
>  http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
>
> For the stable distribution (wheezy), these problems have been fixed in
> version 5.5.35+dfsg-0+wheezy1.
>
> For the unstable distribution (sid), these problems have been fixed in
> version 5.5.35+dfsg-1.
>
> We recommend that you upgrade your mysql-5.5 packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: http://www.debian.org/security/
>
> Mailing list: [email protected]
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iQIcBAEBCgAGBQJS4Tb/AAoJEAVMuPMTQ89ET1kP/1XFwa9nlAU1CUOVZc5kBuAV
> EgQVQRKpfclCqZ1nKpxb5oNlEkU8EyT1JRmQ0bK9Hwqt61hBIbt5S3aKnvWyA+oC
> dGIKBeaLbhbRcPGUiDbF2eSiqh+f+QNAypoc5cDDlcQBXPA667KNeP3on0ZUts/m
> RY7dzJmrh013TDdhaKvUxq86lOZgUxwvWAtjJjnEzKMPSM9d3nueVtKwge/H4YJh
> KULTysQa5MAAQmKQ03mkbKRbBZ3UKo74xwgGeKctFLsysKeivY/WQSFPBexnwBx+
> ZbU1XK3t5zfVyWLkSzL5aqKchFWxmTGnMSdEnRmz/zotiSeLTsT8KErdtREbu5zP
> 3Ixe9PtpgLoJ6QRDiJUVNrZTnSJ2GOmDHMAtWUhqLYzGjKviM1JiqdVusOpzvODI
> Go8XApADvUG5JrPO1oZR+1CfcX3RaYWJDJQbwJ7s9uU9ATIc+y5HWUkGGRES8CBG
> iMUJDe3Wwxic/wS2r/SJkBlhINHy7CrOzGic+blF3+qXcH4R5qcCcfGmQ/EmKpqo
> nC2mfqCIu7mnQq7VrmGbEJOdohm4g43iQz8Dwckl9aTYuu+vG2UzTYRKUhx+jLhZ
> e4PGso/Sm5X4nMgqo8GEEqhO3z4VrtWrsH0NewSrfn8XYz9hyMd1cQgVjV4H0M7u
> iWdDB6CHFSSuL7O919Pd
> =AfR1
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact
> [email protected]
> Archive: http://lists.debian.org/[email protected]
>
>

Reply via email to