lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 06 Feb 2013 15:52:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2013:008 ] mysql

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:008
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : mysql
 Date    : February 6, 2013
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilites has been found and corrected in mysql:
 
 sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before
 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62,
 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23,
 when running in certain environments with certain implementations of
 the memcmp function, allows remote attackers to bypass authentication
 by repeatedly authenticating with the same incorrect password,
 which eventually causes a token comparison to succeed due to an
 improperly-checked return value (CVE-2012-2122).
 
 MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote
 authenticated users to cause a denial of service (mysqld crash)
 via vectors related to incorrect calculation and a sort order index
 (CVE-2012-2749).
 
 Stack-based buffer overflow in Oracle MySQL 5.5.19 and other versions
 through 5.5.28, and 5.1.53 and other versions through 5.1.66, and
 MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before
 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to
 execute arbitrary code via a long argument to the GRANT FILE command
 (CVE-2012-5611).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2749
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611
 http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 fc4d3016b0f765b6bc032cd8419ed389  mes5/i586/libmysql15-5.0.96-0.2mdvmes5.2.i586.rpm
 2100e58e1f296aa6301b72ccfe7facea  mes5/i586/libmysql-devel-5.0.96-0.2mdvmes5.2.i586.rpm
 31e724b305071c6a9b6de77f60efe4c4  mes5/i586/libmysql-static-devel-5.0.96-0.2mdvmes5.2.i586.rpm
 657bb67bd96b4d60c2c35deed56c275c  mes5/i586/mysql-5.0.96-0.2mdvmes5.2.i586.rpm
 63ea45bacd62d4826aab267f70bb4b5c  mes5/i586/mysql-bench-5.0.96-0.2mdvmes5.2.i586.rpm
 92ebddf104c957aedefc3c85df9dda27  mes5/i586/mysql-client-5.0.96-0.2mdvmes5.2.i586.rpm
 bcadb448a66472b54d6a51d03045f5a8  mes5/i586/mysql-common-5.0.96-0.2mdvmes5.2.i586.rpm
 a7179661caf876546ebc459a76e86a6c  mes5/i586/mysql-doc-5.0.96-0.2mdvmes5.2.i586.rpm
 f60dd8694dc591497ea1ea8b2408761f  mes5/i586/mysql-max-5.0.96-0.2mdvmes5.2.i586.rpm
 9ff45bc93a2179bf0de50e6b9c6da892  mes5/i586/mysql-ndb-extra-5.0.96-0.2mdvmes5.2.i586.rpm
 59c20bd6a41f80b4cbe8428f8d081da2  mes5/i586/mysql-ndb-management-5.0.96-0.2mdvmes5.2.i586.rpm
 f971d8627778d1f3046f3f01d7a4d7b6  mes5/i586/mysql-ndb-storage-5.0.96-0.2mdvmes5.2.i586.rpm
 4d82592f868eef0f22f5e1195dfb8865  mes5/i586/mysql-ndb-tools-5.0.96-0.2mdvmes5.2.i586.rpm 
 1f96c2275ada2cf76d3ae8e18399f664  mes5/SRPMS/mysql-5.0.96-0.2mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 a1e23a45f6a852cfb592ba9f86714d7d  mes5/x86_64/lib64mysql15-5.0.96-0.2mdvmes5.2.x86_64.rpm
 bd612f74fba9117055aca25a4413258d  mes5/x86_64/lib64mysql-devel-5.0.96-0.2mdvmes5.2.x86_64.rpm
 6a2c935780de206125dc3b32a2fe9e0b  mes5/x86_64/lib64mysql-static-devel-5.0.96-0.2mdvmes5.2.x86_64.rpm
 6df1fa963235ab8a11db68abc8de6b38  mes5/x86_64/mysql-5.0.96-0.2mdvmes5.2.x86_64.rpm
 338ede1fe624e0831799163fd5fb8b53  mes5/x86_64/mysql-bench-5.0.96-0.2mdvmes5.2.x86_64.rpm
 4174052845228297cedee1983d9ae1bf  mes5/x86_64/mysql-client-5.0.96-0.2mdvmes5.2.x86_64.rpm
 e346393d89f1536cf1b0cb831bc17870  mes5/x86_64/mysql-common-5.0.96-0.2mdvmes5.2.x86_64.rpm
 7c7d39955611c104931e75f5004bf30a  mes5/x86_64/mysql-doc-5.0.96-0.2mdvmes5.2.x86_64.rpm
 15fdbbb1ab8fad3536d494c0666f85ca  mes5/x86_64/mysql-max-5.0.96-0.2mdvmes5.2.x86_64.rpm
 dcdea145c396d57f7fcb766286f9578a  mes5/x86_64/mysql-ndb-extra-5.0.96-0.2mdvmes5.2.x86_64.rpm
 5c093cf81e506c605b9832e0c6e2635c  mes5/x86_64/mysql-ndb-management-5.0.96-0.2mdvmes5.2.x86_64.rpm
 13158037cfe0ad1aca84798d95a791db  mes5/x86_64/mysql-ndb-storage-5.0.96-0.2mdvmes5.2.x86_64.rpm
 4d3ebdb87de4fa1e2bf1b0b860bdfe83  mes5/x86_64/mysql-ndb-tools-5.0.96-0.2mdvmes5.2.x86_64.rpm 
 1f96c2275ada2cf76d3ae8e18399f664  mes5/SRPMS/mysql-5.0.96-0.2mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFREkJimqjQ0CJFipgRAl/xAJ9Nyz5xHQdEiX+a2XzSxNaQjSRruwCgucW5
SC4KSoeUSI2UBeT3OatnMDY=
=mUvH
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ