lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030919043737.24117.qmail@updates.mandrakesoft.com>
Date: 19 Sep 2003 04:37:37 -0000
From: Mandrake Linux Security Team <security@...ux-mandrake.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2003:094 - Updated MySQL packages fix buffer overflow vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           MySQL
Advisory ID:            MDKSA-2003:094
Date:                   September 18th, 2003

Affected versions:	8.2, 9.0, 9.1, Corporate Server 2.1
________________________________________________________________________

Problem Description:

 A buffer overflow was discovered in MySQL that could be executed by any
 user with "ALTER TABLE" privileges on the "mysql" database.  If
 successfully exploited, the attacker could execute arbitrary code with
 the privileges of the user running the mysqld process (mysqld).  The
 "mysql" database is used by MySQL for internal record keeping and by
 default only the "root" user, or MySQL administrative account, has
 permission to alter its tables.
 
 This vulnerability was corrected in MySQL 4.0.15 and all previous
 versions are vulnerable.  These packages have been patched to correct
 the problem.
________________________________________________________________________

References:
  
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0780
  http://lists.netsys.com/pipermail/full-disclosure/2003-September/009819.html
________________________________________________________________________

Updated Packages:
  
 Corporate Server 2.1:
 a5b26c78065992c17ee8a5a4e70cd86c  corporate/2.1/RPMS/MySQL-3.23.56-1.4mdk.i586.rpm
 ddab095d7a05aadf9df8c567106048f7  corporate/2.1/RPMS/MySQL-Max-3.23.56-1.4mdk.i586.rpm
 976aa2ae6708e05ab530ef99e594ad7c  corporate/2.1/RPMS/MySQL-bench-3.23.56-1.4mdk.i586.rpm
 f5f2bc5b51ea1f7fc8b75522f5847212  corporate/2.1/RPMS/MySQL-client-3.23.56-1.4mdk.i586.rpm
 f3b68760fc14e323968128d2dd2a2424  corporate/2.1/RPMS/libmysql10-3.23.56-1.4mdk.i586.rpm
 736921df70148f22ac2bf476f65a40e1  corporate/2.1/RPMS/libmysql10-devel-3.23.56-1.4mdk.i586.rpm
 f5117c9dd321fb2316454e6d1517a26c  corporate/2.1/SRPMS/MySQL-3.23.56-1.4mdk.src.rpm

 Corporate Server 2.1/x86_64:
 db49e2a673e2d7035c4254b4f362d7ba  x86_64/corporate/2.1/RPMS/MySQL-3.23.56-1.4mdk.x86_64.rpm
 54ce8bc1925e6c3e77e5423efc1eb8db  x86_64/corporate/2.1/RPMS/MySQL-Max-3.23.56-1.4mdk.x86_64.rpm
 b12cdc078e5fe6cd1a446b1c2989105d  x86_64/corporate/2.1/RPMS/MySQL-bench-3.23.56-1.4mdk.x86_64.rpm
 bcc9eb20d536d3cb11987de2c73979c1  x86_64/corporate/2.1/RPMS/MySQL-client-3.23.56-1.4mdk.x86_64.rpm
 ca05b51ed47aeb9f025364aeae0deb40  x86_64/corporate/2.1/RPMS/libmysql10-3.23.56-1.4mdk.x86_64.rpm
 df3d171bbc930cc741b4b9e927b27b1c  x86_64/corporate/2.1/RPMS/libmysql10-devel-3.23.56-1.4mdk.x86_64.rpm
 f5117c9dd321fb2316454e6d1517a26c  x86_64/corporate/2.1/SRPMS/MySQL-3.23.56-1.4mdk.src.rpm

 Mandrake Linux 8.2:
 33068edb004e974dc2f315b88c6cc590  8.2/RPMS/MySQL-3.23.47-5.5mdk.i586.rpm
 1d1d8d91f74b93edb22d40f1588bda30  8.2/RPMS/MySQL-bench-3.23.47-5.5mdk.i586.rpm
 ccefbcd92d003631f911924c78ba5c26  8.2/RPMS/MySQL-client-3.23.47-5.5mdk.i586.rpm
 4888d5aebdd32d9f4cb3fd9beb639864  8.2/RPMS/libmysql10-3.23.47-5.5mdk.i586.rpm
 e012e7d183509b0a7f20d965d6f867e8  8.2/RPMS/libmysql10-devel-3.23.47-5.5mdk.i586.rpm
 e6ac76b4b1e3b10f4f29b52bd07b0290  8.2/SRPMS/MySQL-3.23.47-5.5mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 71901d706aef93067cf46f0e3bdd2347  ppc/8.2/RPMS/MySQL-3.23.47-5.5mdk.ppc.rpm
 09fc8ebcc7269b298887a09443308c81  ppc/8.2/RPMS/MySQL-bench-3.23.47-5.5mdk.ppc.rpm
 b2d82052b870b9b22a06763932400d27  ppc/8.2/RPMS/MySQL-client-3.23.47-5.5mdk.ppc.rpm
 995685714e0c14c0ec69a3b010e30f8e  ppc/8.2/RPMS/libmysql10-3.23.47-5.5mdk.ppc.rpm
 d815cd44b55da1cb9410fd51afe8816d  ppc/8.2/RPMS/libmysql10-devel-3.23.47-5.5mdk.ppc.rpm
 e6ac76b4b1e3b10f4f29b52bd07b0290  ppc/8.2/SRPMS/MySQL-3.23.47-5.5mdk.src.rpm

 Mandrake Linux 9.0:
 a5b26c78065992c17ee8a5a4e70cd86c  9.0/RPMS/MySQL-3.23.56-1.4mdk.i586.rpm
 ddab095d7a05aadf9df8c567106048f7  9.0/RPMS/MySQL-Max-3.23.56-1.4mdk.i586.rpm
 976aa2ae6708e05ab530ef99e594ad7c  9.0/RPMS/MySQL-bench-3.23.56-1.4mdk.i586.rpm
 f5f2bc5b51ea1f7fc8b75522f5847212  9.0/RPMS/MySQL-client-3.23.56-1.4mdk.i586.rpm
 f3b68760fc14e323968128d2dd2a2424  9.0/RPMS/libmysql10-3.23.56-1.4mdk.i586.rpm
 736921df70148f22ac2bf476f65a40e1  9.0/RPMS/libmysql10-devel-3.23.56-1.4mdk.i586.rpm
 f5117c9dd321fb2316454e6d1517a26c  9.0/SRPMS/MySQL-3.23.56-1.4mdk.src.rpm

 Mandrake Linux 9.1:
 b20d36a855f8f0e087e47fec91a3ce91  9.1/RPMS/MySQL-4.0.11a-5.1mdk.i586.rpm
 7c8a41466b97a28ffbb1fba78f9e2f0b  9.1/RPMS/MySQL-Max-4.0.11a-5.1mdk.i586.rpm
 231c9f602fafb2c142b7f02753f8c3eb  9.1/RPMS/MySQL-bench-4.0.11a-5.1mdk.i586.rpm
 ade857592838f3908d69578475bf6bcd  9.1/RPMS/MySQL-client-4.0.11a-5.1mdk.i586.rpm
 f8d439bec4e97f4f4efb13617875707a  9.1/RPMS/MySQL-common-4.0.11a-5.1mdk.i586.rpm
 7ed8a377e95b39805f7313ac46f881b8  9.1/RPMS/libmysql12-4.0.11a-5.1mdk.i586.rpm
 61bc73d27c7f9a37a58532795d3411d4  9.1/RPMS/libmysql12-devel-4.0.11a-5.1mdk.i586.rpm
 e122ba5f17a01c92c07d8220120b8ab1  9.1/SRPMS/MySQL-4.0.11a-5.1mdk.src.rpm

 Mandrake Linux 9.1/PPC:
 dbcaaee7d1e1f802ced35da3c6190305  ppc/9.1/RPMS/MySQL-4.0.11a-5.1mdk.ppc.rpm
 0521fee096dedee3eb791bd6a92bf796  ppc/9.1/RPMS/MySQL-Max-4.0.11a-5.1mdk.ppc.rpm
 c1ca4c9d4155e153b119a9cfde27cbea  ppc/9.1/RPMS/MySQL-bench-4.0.11a-5.1mdk.ppc.rpm
 2d38805e5057e566d8e50cd543749f99  ppc/9.1/RPMS/MySQL-client-4.0.11a-5.1mdk.ppc.rpm
 9a1dd2b49a2a40ac16c73dec01cb1a4f  ppc/9.1/RPMS/MySQL-common-4.0.11a-5.1mdk.ppc.rpm
 960bf6b6c8cb542d201f5813dcc9e933  ppc/9.1/RPMS/libmysql12-4.0.11a-5.1mdk.ppc.rpm
 0ef8dd187b998aef5414ff8c7793e836  ppc/9.1/RPMS/libmysql12-devel-4.0.11a-5.1mdk.ppc.rpm
 e122ba5f17a01c92c07d8220120b8ab1  ppc/9.1/SRPMS/MySQL-4.0.11a-5.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate or urpmi.  The verification
of md5 checksums and GPG signatures is performed automatically for you.

A list of FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team by executing:

  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/aogRmqjQ0CJFipgRAmgUAJ9y9pm5zdp/DzhqHSAqbfnThntOGgCg7jeO
odycyq7p9VSZv6iaWSOOjqI=
=cSN6
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ