Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2008:0364 - Security Advisory
Issued:
2008-05-20
Updated:
2008-05-21

RHSA-2008:0364 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: mysql security and bug fix update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated mysql packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

Description

MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
client/server implementation consisting of a server daemon (mysqld), and
many different client programs and libraries.

MySQL did not require privileges such as "SELECT" for the source table in a
"CREATE TABLE LIKE" statement. An authenticated user could obtain sensitive
information, such as the table structure. (CVE-2007-3781)

A flaw was discovered in MySQL that allowed an authenticated user to gain
update privileges for a table in another database, via a view that refers
to the external table. (CVE-2007-3782)

MySQL did not require the "DROP" privilege for "RENAME TABLE" statements.
An authenticated user could use this flaw to rename arbitrary tables.
(CVE-2007-2691)

A flaw was discovered in the mysql_change_db function when returning from
SQL SECURITY INVOKER stored routines. An authenticated user could use this
flaw to gain database privileges. (CVE-2007-2692)

MySQL allowed an authenticated user to bypass logging mechanisms via SQL
queries that contain the NULL character, which were not properly handled by
the mysql_real_query function. (CVE-2006-0903)

MySQL allowed an authenticated user to access a table through a previously
created MERGE table, even after the user's privileges were revoked from
the original table, which might violate intended security policy. This is
addressed by allowing the MERGE storage engine to be disabled, which can
be done by running mysqld with the "--skip-merge" option. (CVE-2006-4031)

MySQL evaluated arguments in the wrong security context, which allowed an
authenticated user to gain privileges through a routine that had been made
available using "GRANT EXECUTE". (CVE-2006-4227)

Multiple flaws in MySQL allowed an authenticated user to cause the MySQL
daemon to crash via crafted SQL queries. This only caused a temporary
denial of service, as the MySQL daemon is automatically restarted after the
crash. (CVE-2006-7232, CVE-2007-1420, CVE-2007-2583)

As well, these updated packages fix the following bugs:

  • a separate counter was used for "insert delayed" statements, which caused

rows to be discarded. In these updated packages, "insert delayed"
statements no longer use a separate counter, which resolves this issue.

  • due to a bug in the Native POSIX Thread Library, in certain situations,

"flush tables" caused a deadlock on tables that had a read lock. The mysqld
daemon had to be killed forcefully. Now, "COND_refresh" has been replaced
with "COND_global_read_lock", which resolves this issue.

  • mysqld crashed if a query for an unsigned column type contained a

negative value for a "WHERE [column] NOT IN" subquery.

  • in master and slave server situations, specifying "on duplicate key

update" for "insert" statements did not update slave servers.

  • in the mysql client, empty strings were displayed as "NULL". For

example, running "insert into [table-name] values (' ');" resulted in a
"NULL" entry being displayed when querying the table using "select * from
[table-name];".

  • a bug in the optimizer code resulted in certain queries executing much

slower than expected.

  • on 64-bit PowerPC architectures, MySQL did not calculate the thread stack

size correctly, which could have caused MySQL to crash when overly-complex
queries were used.

Note: these updated packages upgrade MySQL to version 5.0.45. For a full
list of bug fixes and enhancements, refer to the MySQL release notes:
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0.html

All mysql users are advised to upgrade to these updated packages, which
resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 194613 - CVE-2006-0903 Mysql log file obfuscation
  • BZ - 202246 - CVE-2006-4031 MySQL improper permission revocation
  • BZ - 216427 - CVE-2006-4227 mysql improper suid argument evaluation
  • BZ - 232603 - CVE-2007-1420 Single MySQL worker can be crashed (NULL deref) with certain SELECT statements
  • BZ - 240813 - CVE-2007-2583 mysql: DoS via statement with crafted IF clause
  • BZ - 241688 - CVE-2007-2691 mysql DROP privilege not enforced when renaming tables
  • BZ - 241689 - CVE-2007-2692 mysql SECURITY INVOKER functions do not drop privileges
  • BZ - 248553 - CVE-2007-3781 CVE-2007-3782 New release of MySQL fixes security bugs
  • BZ - 254012 - Mysql bug 20048: 5.0.22 FLUSH TABLES WITH READ LOCK bug; need upgrade to 5.0.23
  • BZ - 256501 - mysql 5.0.22 still has a lot of bugs ; need upgrade
  • BZ - 349121 - MySQL client will display empty strings as NULL (fixed in 5.0.23)
  • BZ - 434264 - CVE-2006-7232 mysql: daemon crash via EXPLAIN on queries on information schema
  • BZ - 435391 - mysql does not calculate thread stack size correctly for RHEL5

CVEs

  • CVE-2006-0903
  • CVE-2006-4031
  • CVE-2006-4227
  • CVE-2007-2692
  • CVE-2007-2691
  • CVE-2007-3782
  • CVE-2007-3781
  • CVE-2007-2583
  • CVE-2006-7232
  • CVE-2007-1420

References

  • http://www.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
mysql-5.0.45-7.el5.src.rpm SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca
x86_64
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94
mysql-5.0.45-7.el5.x86_64.rpm SHA-256: 923ee8f650075729e7ba8e3d107c7a3e5b38884a117a8119690bc07e54b9bfa3
mysql-bench-5.0.45-7.el5.x86_64.rpm SHA-256: fa150945f6a7b3a39af081c1adbb623ce56ced6e854a98ca39527cded8c66a05
mysql-devel-5.0.45-7.el5.i386.rpm SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67
mysql-devel-5.0.45-7.el5.x86_64.rpm SHA-256: fcc7854206e307f925ace6ba16e0ec2e73bd34895f306778f0ff9da5ce15e4b4
mysql-server-5.0.45-7.el5.x86_64.rpm SHA-256: 17eafb6f32139fb2d163f65c1bf3ffe75c304f79e5177118d3baffeae81fe199
mysql-test-5.0.45-7.el5.x86_64.rpm SHA-256: 6e37372d587db0c34b49aa881fb3939baeb445753a460affd3b1368b67e40aef
ia64
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94
mysql-5.0.45-7.el5.ia64.rpm SHA-256: 0eab08db72ef2f8381a072d46ab887fbc936dcb26782044e61148bc86357f768
mysql-bench-5.0.45-7.el5.ia64.rpm SHA-256: 65d47de0063f14b0e461b65452d2342dc2653875b2fffb797465f21e9b1f0f66
mysql-devel-5.0.45-7.el5.ia64.rpm SHA-256: 4f4151e8832f233ed655d250a1b299875fdc4ba90568a5fc140aa8c5686128e2
mysql-server-5.0.45-7.el5.ia64.rpm SHA-256: 5523269c1f01a20a1e8f6aeef316b02880aebb7a6ee8f86eebd747e45e56a9fb
mysql-test-5.0.45-7.el5.ia64.rpm SHA-256: 9ca158d651ecf91689dcefda097ae82f90c9e49bdbd04526afd99d9d34d76494
i386
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94
mysql-bench-5.0.45-7.el5.i386.rpm SHA-256: c0d2ad521e0b3a912a1195e859fcc82c8761b0ece5eb08a3b4f64c708009e46a
mysql-devel-5.0.45-7.el5.i386.rpm SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67
mysql-server-5.0.45-7.el5.i386.rpm SHA-256: 5ef2babb9e38c8f83a24b6d8b3a77fc4f01be542d5a9755166c36526e9547c5c
mysql-test-5.0.45-7.el5.i386.rpm SHA-256: bfbdd350107197f8a87183069399432b088d68721b39431c4e57e76f972a2795

Red Hat Enterprise Linux Workstation 5

SRPM
mysql-5.0.45-7.el5.src.rpm SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca
x86_64
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94
mysql-5.0.45-7.el5.x86_64.rpm SHA-256: 923ee8f650075729e7ba8e3d107c7a3e5b38884a117a8119690bc07e54b9bfa3
mysql-bench-5.0.45-7.el5.x86_64.rpm SHA-256: fa150945f6a7b3a39af081c1adbb623ce56ced6e854a98ca39527cded8c66a05
mysql-devel-5.0.45-7.el5.i386.rpm SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67
mysql-devel-5.0.45-7.el5.x86_64.rpm SHA-256: fcc7854206e307f925ace6ba16e0ec2e73bd34895f306778f0ff9da5ce15e4b4
mysql-server-5.0.45-7.el5.x86_64.rpm SHA-256: 17eafb6f32139fb2d163f65c1bf3ffe75c304f79e5177118d3baffeae81fe199
mysql-test-5.0.45-7.el5.x86_64.rpm SHA-256: 6e37372d587db0c34b49aa881fb3939baeb445753a460affd3b1368b67e40aef
i386
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94
mysql-bench-5.0.45-7.el5.i386.rpm SHA-256: c0d2ad521e0b3a912a1195e859fcc82c8761b0ece5eb08a3b4f64c708009e46a
mysql-devel-5.0.45-7.el5.i386.rpm SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67
mysql-server-5.0.45-7.el5.i386.rpm SHA-256: 5ef2babb9e38c8f83a24b6d8b3a77fc4f01be542d5a9755166c36526e9547c5c
mysql-test-5.0.45-7.el5.i386.rpm SHA-256: bfbdd350107197f8a87183069399432b088d68721b39431c4e57e76f972a2795

Red Hat Enterprise Linux Desktop 5

SRPM
mysql-5.0.45-7.el5.src.rpm SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca
x86_64
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94
mysql-5.0.45-7.el5.x86_64.rpm SHA-256: 923ee8f650075729e7ba8e3d107c7a3e5b38884a117a8119690bc07e54b9bfa3
i386
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
mysql-5.0.45-7.el5.src.rpm SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca
s390x
mysql-5.0.45-7.el5.s390.rpm SHA-256: 0bf57ca8b18da96c84bff503b885037e65ce67cdfed031f1fa632ee10d714e49
mysql-5.0.45-7.el5.s390x.rpm SHA-256: 332832a6fdead20e94115adc9c15fa3bc7674a9ac96c54d0691a5e03721cafd9
mysql-bench-5.0.45-7.el5.s390x.rpm SHA-256: 375e6cdcc871ed2efb8dccf177338c73767528dd0a1176a570cbedb3b0f7b3cc
mysql-devel-5.0.45-7.el5.s390.rpm SHA-256: 4f9f03b76568e466c490502e13423d1dbdbd26e4fec46beb24d2f8e4ff06a6a0
mysql-devel-5.0.45-7.el5.s390x.rpm SHA-256: 843b6f2989c0bdd78182b035900f1c2ffb3673fffc83cf71bc6031864b995ab7
mysql-server-5.0.45-7.el5.s390x.rpm SHA-256: 9f60e16fed49f99003ec36ac71e3de3ed29dc65737c2f0fcadfeee4f07bd8835
mysql-test-5.0.45-7.el5.s390x.rpm SHA-256: 51c46d5ff84d406798b5bbce0240d684a4188b810d2a46f55b130240f11fff8e

Red Hat Enterprise Linux for Power, big endian 5

SRPM
mysql-5.0.45-7.el5.src.rpm SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca
ppc
mysql-5.0.45-7.el5.ppc.rpm SHA-256: e0c2fd7ed823cca51778aa8d5cfd174f6e78ec2779917d0b26591214612325a7
mysql-5.0.45-7.el5.ppc64.rpm SHA-256: b8513f2bb5b913a058c8911f12ba2bebdedebe8dbb853fb24a4787cdfe8a6cb1
mysql-bench-5.0.45-7.el5.ppc.rpm SHA-256: a95b98005790d5176febf3b2f36243b2abeaf18fa0225b2e137357b57c57289e
mysql-devel-5.0.45-7.el5.ppc.rpm SHA-256: c641d0e397f13399dd7d2e31051318ef50ebc2fcfd45b223b401716f490a0075
mysql-devel-5.0.45-7.el5.ppc64.rpm SHA-256: 65683e4251f2d877e8b5c4de786933c3519cfa338917bef79c099f9e47a71717
mysql-server-5.0.45-7.el5.ppc.rpm SHA-256: d83ca74cfc122876d334b9fde7a0b4f1d5ca6b0524917ceecd68e2ce5fe29214
mysql-server-5.0.45-7.el5.ppc64.rpm SHA-256: a2a562c7e1ca19779a7d954ba89794c34ca03d96989991b94b58814ed5209b32
mysql-test-5.0.45-7.el5.ppc.rpm SHA-256: 4b1480aba6c5fd65aae8bbfe968b329f34309056586c7e34a7221ae371655110

Red Hat Enterprise Linux Server from RHUI 5

SRPM
mysql-5.0.45-7.el5.src.rpm SHA-256: b57d3d55e400df5532b30e833179266fad321215eac23b0373f4115ee35225ca
x86_64
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94
mysql-5.0.45-7.el5.x86_64.rpm SHA-256: 923ee8f650075729e7ba8e3d107c7a3e5b38884a117a8119690bc07e54b9bfa3
mysql-bench-5.0.45-7.el5.x86_64.rpm SHA-256: fa150945f6a7b3a39af081c1adbb623ce56ced6e854a98ca39527cded8c66a05
mysql-devel-5.0.45-7.el5.i386.rpm SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67
mysql-devel-5.0.45-7.el5.x86_64.rpm SHA-256: fcc7854206e307f925ace6ba16e0ec2e73bd34895f306778f0ff9da5ce15e4b4
mysql-server-5.0.45-7.el5.x86_64.rpm SHA-256: 17eafb6f32139fb2d163f65c1bf3ffe75c304f79e5177118d3baffeae81fe199
mysql-test-5.0.45-7.el5.x86_64.rpm SHA-256: 6e37372d587db0c34b49aa881fb3939baeb445753a460affd3b1368b67e40aef
i386
mysql-5.0.45-7.el5.i386.rpm SHA-256: f54c0a462669e2db6af1b3300e2df28f5795e18ca421d8d8dfec8dcb30dbfb94
mysql-bench-5.0.45-7.el5.i386.rpm SHA-256: c0d2ad521e0b3a912a1195e859fcc82c8761b0ece5eb08a3b4f64c708009e46a
mysql-devel-5.0.45-7.el5.i386.rpm SHA-256: e17206cc9e26d935d1a98ba166dd563e4b6356a396951eb81c7e4e0ce1f83f67
mysql-server-5.0.45-7.el5.i386.rpm SHA-256: 5ef2babb9e38c8f83a24b6d8b3a77fc4f01be542d5a9755166c36526e9547c5c
mysql-test-5.0.45-7.el5.i386.rpm SHA-256: bfbdd350107197f8a87183069399432b088d68721b39431c4e57e76f972a2795

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter