[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060627135248.GC6253@piware.de>
Date: Tue, 27 Jun 2006 15:52:48 +0200
From: Martin Pitt <martin.pitt@...onical.com>
To: ubuntu-security-announce@...ts.ubuntu.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [USN-306-1] MySQL 4.1 vulnerability
===========================================================
Ubuntu Security Notice USN-306-1 June 27, 2006
mysql-dfsg-4.1 vulnerability
CVE-2006-3081
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 5.10
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 5.10:
mysql-server-4.1 4.1.12-1ubuntu3.6
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
MySQL did not correctly handle NULL as the second argument to the
str_to_date() function. An authenticated user could exploit this to
crash the server.
Updated packages for Ubuntu 5.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.6.diff.gz
Size/MD5: 164878 463c3768464221d0825dbf8fd153432e
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12-1ubuntu3.6.dsc
Size/MD5: 1024 5e533d4f9d9fd83c67d4119a39625e2c
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.12.orig.tar.gz
Size/MD5: 15921909 c7b83a19bd8a4f42d5d64c239d05121f
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.12-1ubuntu3.6_all.deb
Size/MD5: 36742 b96636b4d38a0f45cd5607f26018101a
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_amd64.deb
Size/MD5: 5831370 d23061f89f903c9808b6768dd6d92335
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_amd64.deb
Size/MD5: 1540608 ff3bdbcec7d80ee656fff71318db5f9a
http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_amd64.deb
Size/MD5: 898350 2dbf1c511e23d4d0134979b7ec660264
http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_amd64.deb
Size/MD5: 18433714 158ce4bd992fe64a8695687e82d2ef94
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_i386.deb
Size/MD5: 5348044 41d20999de86b8f7983f62b756212cd1
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_i386.deb
Size/MD5: 1475378 3057a66edc7863f8695d03aec050d0f5
http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_i386.deb
Size/MD5: 866354 8c84ad0649a119fd0370d33756a9c1cb
http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_i386.deb
Size/MD5: 17336250 b1bc484bceaf8a4debdbb1d58d637dd0
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.12-1ubuntu3.6_powerpc.deb
Size/MD5: 6069148 7d5d032fb8f0bed0c3efa6911578854c
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.12-1ubuntu3.6_powerpc.deb
Size/MD5: 1549044 be30993f7e8f207d99f11b43282b5f00
http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.12-1ubuntu3.6_powerpc.deb
Size/MD5: 937622 fb4802c64825f7e4127bbd15b656d214
http://security.ubuntu.com/ubuntu/pool/universe/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.12-1ubuntu3.6_powerpc.deb
Size/MD5: 18523392 31b331faba3c77b55e126b84d24ce223
Download attachment "signature.asc" of type "application/pgp-signature" (192 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists