- Issued:
- 2008-05-20
- Updated:
- 2008-05-21
RHSA-2008:0364 - Security Advisory
Synopsis
Low: mysql security and bug fix update
Type/Severity
Security Advisory: Low
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated mysql packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Description
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
client/server implementation consisting of a server daemon (mysqld), and
many different client programs and libraries.
MySQL did not require privileges such as "SELECT" for the source table in a
"CREATE TABLE LIKE" statement. An authenticated user could obtain sensitive
information, such as the table structure. (CVE-2007-3781)
A flaw was discovered in MySQL that allowed an authenticated user to gain
update privileges for a table in another database, via a view that refers
to the external table. (CVE-2007-3782)
MySQL did not require the "DROP" privilege for "RENAME TABLE" statements.
An authenticated user could use this flaw to rename arbitrary tables.
(CVE-2007-2691)
A flaw was discovered in the mysql_change_db function when returning from
SQL SECURITY INVOKER stored routines. An authenticated user could use this
flaw to gain database privileges. (CVE-2007-2692)
MySQL allowed an authenticated user to bypass logging mechanisms via SQL
queries that contain the NULL character, which were not properly handled by
the mysql_real_query function. (CVE-2006-0903)
MySQL allowed an authenticated user to access a table through a previously
created MERGE table, even after the user's privileges were revoked from
the original table, which might violate intended security policy. This is
addressed by allowing the MERGE storage engine to be disabled, which can
be done by running mysqld with the "--skip-merge" option. (CVE-2006-4031)
MySQL evaluated arguments in the wrong security context, which allowed an
authenticated user to gain privileges through a routine that had been made
available using "GRANT EXECUTE". (CVE-2006-4227)
Multiple flaws in MySQL allowed an authenticated user to cause the MySQL
daemon to crash via crafted SQL queries. This only caused a temporary
denial of service, as the MySQL daemon is automatically restarted after the
crash. (CVE-2006-7232, CVE-2007-1420, CVE-2007-2583)
As well, these updated packages fix the following bugs:
- a separate counter was used for "insert delayed" statements, which caused
rows to be discarded. In these updated packages, "insert delayed"
statements no longer use a separate counter, which resolves this issue.
- due to a bug in the Native POSIX Thread Library, in certain situations,
"flush tables" caused a deadlock on tables that had a read lock. The mysqld
daemon had to be killed forcefully. Now, "COND_refresh" has been replaced
with "COND_global_read_lock", which resolves this issue.
- mysqld crashed if a query for an unsigned column type contained a
negative value for a "WHERE [column] NOT IN" subquery.
- in master and slave server situations, specifying "on duplicate key
update" for "insert" statements did not update slave servers.
- in the mysql client, empty strings were displayed as "NULL". For
example, running "insert into [table-name] values (' ');" resulted in a
"NULL" entry being displayed when querying the table using "select * from
[table-name];".
- a bug in the optimizer code resulted in certain queries executing much
slower than expected.
- on 64-bit PowerPC architectures, MySQL did not calculate the thread stack
size correctly, which could have caused MySQL to crash when overly-complex
queries were used.
Note: these updated packages upgrade MySQL to version 5.0.45. For a full
list of bug fixes and enhancements, refer to the MySQL release notes:
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0.html
All mysql users are advised to upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 194613 - CVE-2006-0903 Mysql log file obfuscation
- BZ - 202246 - CVE-2006-4031 MySQL improper permission revocation
- BZ - 216427 - CVE-2006-4227 mysql improper suid argument evaluation
- BZ - 232603 - CVE-2007-1420 Single MySQL worker can be crashed (NULL deref) with certain SELECT statements
- BZ - 240813 - CVE-2007-2583 mysql: DoS via statement with crafted IF clause
- BZ - 241688 - CVE-2007-2691 mysql DROP privilege not enforced when renaming tables
- BZ - 241689 - CVE-2007-2692 mysql SECURITY INVOKER functions do not drop privileges
- BZ - 248553 - CVE-2007-3781 CVE-2007-3782 New release of MySQL fixes security bugs
- BZ - 254012 - Mysql bug 20048: 5.0.22 FLUSH TABLES WITH READ LOCK bug; need upgrade to 5.0.23
- BZ - 256501 - mysql 5.0.22 still has a lot of bugs ; need upgrade
- BZ - 349121 - MySQL client will display empty strings as NULL (fixed in 5.0.23)
- BZ - 434264 - CVE-2006-7232 mysql: daemon crash via EXPLAIN on queries on information schema
- BZ - 435391 - mysql does not calculate thread stack size correctly for RHEL5
CVEs
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
mysql-5.0.45-7.el5.src.rpm | SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca |
x86_64 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
mysql-5.0.45-7.el5.x86_64.rpm | SHA-256: 923ee8f650075729e7ba8e3d107c7a3e5b38884a117a8119690bc07e54b9bfa3 |
mysql-bench-5.0.45-7.el5.x86_64.rpm | SHA-256: fa150945f6a7b3a39af081c1adbb623ce56ced6e854a98ca39527cded8c66a05 |
mysql-devel-5.0.45-7.el5.i386.rpm | SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67 |
mysql-devel-5.0.45-7.el5.x86_64.rpm | SHA-256: fcc7854206e307f925ace6ba16e0ec2e73bd34895f306778f0ff9da5ce15e4b4 |
mysql-server-5.0.45-7.el5.x86_64.rpm | SHA-256: 17eafb6f32139fb2d163f65c1bf3ffe75c304f79e5177118d3baffeae81fe199 |
mysql-test-5.0.45-7.el5.x86_64.rpm | SHA-256: 6e37372d587db0c34b49aa881fb3939baeb445753a460affd3b1368b67e40aef |
ia64 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
mysql-5.0.45-7.el5.ia64.rpm | SHA-256: 0eab08db72ef2f8381a072d46ab887fbc936dcb26782044e61148bc86357f768 |
mysql-bench-5.0.45-7.el5.ia64.rpm | SHA-256: 65d47de0063f14b0e461b65452d2342dc2653875b2fffb797465f21e9b1f0f66 |
mysql-devel-5.0.45-7.el5.ia64.rpm | SHA-256: 4f4151e8832f233ed655d250a1b299875fdc4ba90568a5fc140aa8c5686128e2 |
mysql-server-5.0.45-7.el5.ia64.rpm | SHA-256: 5523269c1f01a20a1e8f6aeef316b02880aebb7a6ee8f86eebd747e45e56a9fb |
mysql-test-5.0.45-7.el5.ia64.rpm | SHA-256: 9ca158d651ecf91689dcefda097ae82f90c9e49bdbd04526afd99d9d34d76494 |
i386 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
mysql-bench-5.0.45-7.el5.i386.rpm | SHA-256: c0d2ad521e0b3a912a1195e859fcc82c8761b0ece5eb08a3b4f64c708009e46a |
mysql-devel-5.0.45-7.el5.i386.rpm | SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67 |
mysql-server-5.0.45-7.el5.i386.rpm | SHA-256: 5ef2babb9e38c8f83a24b6d8b3a77fc4f01be542d5a9755166c36526e9547c5c |
mysql-test-5.0.45-7.el5.i386.rpm | SHA-256: bfbdd350107197f8a87183069399432b088d68721b39431c4e57e76f972a2795 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
mysql-5.0.45-7.el5.src.rpm | SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca |
x86_64 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
mysql-5.0.45-7.el5.x86_64.rpm | SHA-256: 923ee8f650075729e7ba8e3d107c7a3e5b38884a117a8119690bc07e54b9bfa3 |
mysql-bench-5.0.45-7.el5.x86_64.rpm | SHA-256: fa150945f6a7b3a39af081c1adbb623ce56ced6e854a98ca39527cded8c66a05 |
mysql-devel-5.0.45-7.el5.i386.rpm | SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67 |
mysql-devel-5.0.45-7.el5.x86_64.rpm | SHA-256: fcc7854206e307f925ace6ba16e0ec2e73bd34895f306778f0ff9da5ce15e4b4 |
mysql-server-5.0.45-7.el5.x86_64.rpm | SHA-256: 17eafb6f32139fb2d163f65c1bf3ffe75c304f79e5177118d3baffeae81fe199 |
mysql-test-5.0.45-7.el5.x86_64.rpm | SHA-256: 6e37372d587db0c34b49aa881fb3939baeb445753a460affd3b1368b67e40aef |
i386 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
mysql-bench-5.0.45-7.el5.i386.rpm | SHA-256: c0d2ad521e0b3a912a1195e859fcc82c8761b0ece5eb08a3b4f64c708009e46a |
mysql-devel-5.0.45-7.el5.i386.rpm | SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67 |
mysql-server-5.0.45-7.el5.i386.rpm | SHA-256: 5ef2babb9e38c8f83a24b6d8b3a77fc4f01be542d5a9755166c36526e9547c5c |
mysql-test-5.0.45-7.el5.i386.rpm | SHA-256: bfbdd350107197f8a87183069399432b088d68721b39431c4e57e76f972a2795 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
mysql-5.0.45-7.el5.src.rpm | SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca |
x86_64 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
mysql-5.0.45-7.el5.x86_64.rpm | SHA-256: 923ee8f650075729e7ba8e3d107c7a3e5b38884a117a8119690bc07e54b9bfa3 |
i386 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
mysql-5.0.45-7.el5.src.rpm | SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca |
s390x | |
mysql-5.0.45-7.el5.s390.rpm | SHA-256: 0bf57ca8b18da96c84bff503b885037e65ce67cdfed031f1fa632ee10d714e49 |
mysql-5.0.45-7.el5.s390x.rpm | SHA-256: 332832a6fdead20e94115adc9c15fa3bc7674a9ac96c54d0691a5e03721cafd9 |
mysql-bench-5.0.45-7.el5.s390x.rpm | SHA-256: 375e6cdcc871ed2efb8dccf177338c73767528dd0a1176a570cbedb3b0f7b3cc |
mysql-devel-5.0.45-7.el5.s390.rpm | SHA-256: 4f9f03b76568e466c490502e13423d1dbdbd26e4fec46beb24d2f8e4ff06a6a0 |
mysql-devel-5.0.45-7.el5.s390x.rpm | SHA-256: 843b6f2989c0bdd78182b035900f1c2ffb3673fffc83cf71bc6031864b995ab7 |
mysql-server-5.0.45-7.el5.s390x.rpm | SHA-256: 9f60e16fed49f99003ec36ac71e3de3ed29dc65737c2f0fcadfeee4f07bd8835 |
mysql-test-5.0.45-7.el5.s390x.rpm | SHA-256: 51c46d5ff84d406798b5bbce0240d684a4188b810d2a46f55b130240f11fff8e |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
mysql-5.0.45-7.el5.src.rpm | SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca |
ppc | |
mysql-5.0.45-7.el5.ppc.rpm | SHA-256: e0c2fd7ed823cca51778aa8d5cfd174f6e78ec2779917d0b26591214612325a7 |
mysql-5.0.45-7.el5.ppc64.rpm | SHA-256: b8513f2bb5b913a058c8911f12ba2bebdedebe8dbb853fb24a4787cdfe8a6cb1 |
mysql-bench-5.0.45-7.el5.ppc.rpm | SHA-256: a95b98005790d5176febf3b2f36243b2abeaf18fa0225b2e137357b57c57289e |
mysql-devel-5.0.45-7.el5.ppc.rpm | SHA-256: c641d0e397f13399dd7d2e31051318ef50ebc2fcfd45b223b401716f490a0075 |
mysql-devel-5.0.45-7.el5.ppc64.rpm | SHA-256: 65683e4251f2d877e8b5c4de786933c3519cfa338917bef79c099f9e47a71717 |
mysql-server-5.0.45-7.el5.ppc.rpm | SHA-256: d83ca74cfc122876d334b9fde7a0b4f1d5ca6b0524917ceecd68e2ce5fe29214 |
mysql-server-5.0.45-7.el5.ppc64.rpm | SHA-256: a2a562c7e1ca19779a7d954ba89794c34ca03d96989991b94b58814ed5209b32 |
mysql-test-5.0.45-7.el5.ppc.rpm | SHA-256: 4b1480aba6c5fd65aae8bbfe968b329f34309056586c7e34a7221ae371655110 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
mysql-5.0.45-7.el5.src.rpm | SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca |
x86_64 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
mysql-5.0.45-7.el5.x86_64.rpm | SHA-256: 923ee8f650075729e7ba8e3d107c7a3e5b38884a117a8119690bc07e54b9bfa3 |
mysql-bench-5.0.45-7.el5.x86_64.rpm | SHA-256: fa150945f6a7b3a39af081c1adbb623ce56ced6e854a98ca39527cded8c66a05 |
mysql-devel-5.0.45-7.el5.i386.rpm | SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67 |
mysql-devel-5.0.45-7.el5.x86_64.rpm | SHA-256: fcc7854206e307f925ace6ba16e0ec2e73bd34895f306778f0ff9da5ce15e4b4 |
mysql-server-5.0.45-7.el5.x86_64.rpm | SHA-256: 17eafb6f32139fb2d163f65c1bf3ffe75c304f79e5177118d3baffeae81fe199 |
mysql-test-5.0.45-7.el5.x86_64.rpm | SHA-256: 6e37372d587db0c34b49aa881fb3939baeb445753a460affd3b1368b67e40aef |
i386 | |
mysql-5.0.45-7.el5.i386.rpm | SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94 |
mysql-bench-5.0.45-7.el5.i386.rpm | SHA-256: c0d2ad521e0b3a912a1195e859fcc82c8761b0ece5eb08a3b4f64c708009e46a |
mysql-devel-5.0.45-7.el5.i386.rpm | SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67 |
mysql-server-5.0.45-7.el5.i386.rpm | SHA-256: 5ef2babb9e38c8f83a24b6d8b3a77fc4f01be542d5a9755166c36526e9547c5c |
mysql-test-5.0.45-7.el5.i386.rpm | SHA-256: bfbdd350107197f8a87183069399432b088d68721b39431c4e57e76f972a2795 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.