Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mysql
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mysql
ID: RHSA-2005:348-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux Extras
Datum: Di, 5. April 2005, 13:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0710
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0711
Applikationen: MySQL

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: mysql-server security update
Advisory ID: RHSA-2005:348-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-348.html
Issue date: 2005-04-05
Updated on: 2005-04-05
Product: Red Hat Enterprise Linux Extras
CVE Names: CAN-2005-0709 CAN-2005-0710 CAN-2005-0711
---------------------------------------------------------------------

1. Summary:

Updated mysql-server packages that fix several vulnerabilities are now
available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 Extras - i386, ia64, ppc, s390, s390x,
x86_64
Red Hat Desktop version 3 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 3 Extras - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 Extras - i386, ia64, x86_64

3. Problem description:

MySQL is a multi-user, multi-threaded SQL database server.

This update fixes several security risks in the MySQL server.

Stefano Di Paola discovered two bugs in the way MySQL handles user-defined
functions. A user with the ability to create and execute a user defined
function could potentially execute arbitrary code on the MySQL server. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the names CAN-2005-0709 and CAN-2005-0710 to these issues.

Stefano Di Paola also discovered a bug in the way MySQL creates temporary
tables. A local user could create a specially crafted symlink which could
result in the MySQL server overwriting a file which it has write access to.
The Common Vulnerabilities and Exposures project has assigned the name
CAN-2005-0711 to this issue.

All users of the MySQL server are advised to upgrade to these updated
packages, which contain fixes for these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

152437 - CAN-2005-0709 mysql-server update needed for LACD (CAN-2005-0710
CAN-2005-0711)

6. RPMs required:

Red Hat Enterprise Linux AS version 3 Extras:

i386:
a0d19d114ce7f63d116b29b52923a8f1 mysql-server-3.23.58-16.RHEL3.1.i386.rpm

ia64:
6b3e4bf0d64bcb7b5aac852985c6ebc4 mysql-server-3.23.58-16.RHEL3.1.ia64.rpm

ppc:
ab5da18be85332b795fa55fed53d1d82 mysql-server-3.23.58-16.RHEL3.1.ppc.rpm

s390:
7c2fc28a865350b349e05f6665790f6a mysql-server-3.23.58-16.RHEL3.1.s390.rpm

s390x:
9e4990801ea99d9da3bf8ca1f0495a09 mysql-server-3.23.58-16.RHEL3.1.s390x.rpm

x86_64:
6d65a7c1e65e788a63d2e2dab9612bec mysql-server-3.23.58-16.RHEL3.1.x86_64.rpm

Red Hat Desktop version 3 Extras:

i386:
a0d19d114ce7f63d116b29b52923a8f1 mysql-server-3.23.58-16.RHEL3.1.i386.rpm

x86_64:
6d65a7c1e65e788a63d2e2dab9612bec mysql-server-3.23.58-16.RHEL3.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3 Extras:

i386:
a0d19d114ce7f63d116b29b52923a8f1 mysql-server-3.23.58-16.RHEL3.1.i386.rpm

ia64:
6b3e4bf0d64bcb7b5aac852985c6ebc4 mysql-server-3.23.58-16.RHEL3.1.ia64.rpm

x86_64:
6d65a7c1e65e788a63d2e2dab9612bec mysql-server-3.23.58-16.RHEL3.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3 Extras:

i386:
a0d19d114ce7f63d116b29b52923a8f1 mysql-server-3.23.58-16.RHEL3.1.i386.rpm

ia64:
6b3e4bf0d64bcb7b5aac852985c6ebc4 mysql-server-3.23.58-16.RHEL3.1.ia64.rpm

x86_64:
6d65a7c1e65e788a63d2e2dab9612bec mysql-server-3.23.58-16.RHEL3.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCUq2oXlSAg2UNWIIRAiQfAJ4owShaezAfFjOtR0FYFaVoV9z3RgCeNj4+
UmwRRVqc+IBXf71Czm3xLyY=
=56dw
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung