Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0825 - Security Advisory
Issued:
2010-11-03
Updated:
2010-11-03

RHSA-2010:0825 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: mysql security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated mysql packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

MySQL is a multi-user, multi-threaded SQL database server. It consists of
the MySQL server daemon (mysqld) and many client programs and libraries.

It was found that the MySQL PolyFromWKB() function did not sanity check
Well-Known Binary (WKB) data. A remote, authenticated attacker could use
specially-crafted WKB data to crash mysqld. This issue only caused a
temporary denial of service, as mysqld was automatically restarted after
the crash. (CVE-2010-3840)

A flaw was found in the way MySQL processed certain JOIN queries. If a
stored procedure contained JOIN queries, and that procedure was executed
twice in sequence, it could cause an infinite loop, leading to excessive
CPU use (up to 100%). A remote, authenticated attacker could use this flaw
to cause a denial of service. (CVE-2010-3839)

A flaw was found in the way MySQL processed queries that provide a mixture
of numeric and longblob data types to the LEAST or GREATEST function. A
remote, authenticated attacker could use this flaw to crash mysqld. This
issue only caused a temporary denial of service, as mysqld was
automatically restarted after the crash. (CVE-2010-3838)

A flaw was found in the way MySQL processed PREPARE statements containing
both GROUP_CONCAT and the WITH ROLLUP modifier. A remote, authenticated
attacker could use this flaw to crash mysqld. This issue only caused a
temporary denial of service, as mysqld was automatically restarted after
the crash. (CVE-2010-3837)

It was found that MySQL did not properly pre-evaluate LIKE arguments in
view prepare mode. A remote, authenticated attacker could possibly use this
flaw to crash mysqld. (CVE-2010-3836)

A flaw was found in the way MySQL processed statements that assign a value
to a user-defined variable and that also contain a logical value
evaluation. A remote, authenticated attacker could use this flaw to crash
mysqld. This issue only caused a temporary denial of service, as mysqld was
automatically restarted after the crash. (CVE-2010-3835)

A flaw was found in the way MySQL evaluated the arguments of extreme-value
functions, such as LEAST and GREATEST. A remote, authenticated attacker
could use this flaw to crash mysqld. This issue only caused a temporary
denial of service, as mysqld was automatically restarted after the crash.
(CVE-2010-3833)

A flaw was found in the way MySQL processed EXPLAIN statements for some
complex SELECT queries. A remote, authenticated attacker could use this
flaw to crash mysqld. This issue only caused a temporary denial of service,
as mysqld was automatically restarted after the crash. (CVE-2010-3682)

A flaw was found in the way MySQL processed certain alternating READ
requests provided by HANDLER statements. A remote, authenticated attacker
could use this flaw to provide such requests, causing mysqld to crash. This
issue only caused a temporary denial of service, as mysqld was
automatically restarted after the crash. (CVE-2010-3681)

A flaw was found in the way MySQL processed CREATE TEMPORARY TABLE
statements that define NULL columns when using the InnoDB storage engine. A
remote, authenticated attacker could use this flaw to crash mysqld. This
issue only caused a temporary denial of service, as mysqld was
automatically restarted after the crash. (CVE-2010-3680)

A flaw was found in the way MySQL processed JOIN queries that attempt to
retrieve data from a unique SET column. A remote, authenticated attacker
could use this flaw to crash mysqld. This issue only caused a temporary
denial of service, as mysqld was automatically restarted after the crash.
(CVE-2010-3677)

All MySQL users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, the MySQL server daemon (mysqld) will be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 628040 - CVE-2010-3677 MySQL: Mysqld DoS (crash) by processing joins involving a table with a unique SET column (MySQL BZ#54575)
  • BZ - 628192 - CVE-2010-3680 MySQL: mysqld DoS (assertion failure) by using temporary InnoDB engine tables with nullable columns (MySQL bug #54044)
  • BZ - 628328 - CVE-2010-3682 MySQL: mysqld DoS (crash) by processing EXPLAIN statements for complex SQL queries (MySQL bug #52711)
  • BZ - 628680 - CVE-2010-3681 MySQL: mysqld DoS (assertion failure) by alternate reads from two indexes on a table using the HANDLER interface (MySQL bug #54007)
  • BZ - 640751 - CVE-2010-3833 MySQL: CREATE TABLE ... SELECT causes crash when KILL_BAD_DATA is returned (MySQL Bug#55826)
  • BZ - 640819 - CVE-2010-3835 MySQL: crash with user variables, assignments, joins... (MySQL Bug #55564)
  • BZ - 640845 - CVE-2010-3836 MySQL: pre-evaluating LIKE arguments in view prepare mode causes crash (MySQL Bug#54568)
  • BZ - 640856 - CVE-2010-3837 MySQL: crash when group_concat and "with rollup" in prepared statements (MySQL Bug#54476)
  • BZ - 640858 - CVE-2010-3838 MySQL: crash with LONGBLOB and union or update with subquery (MySQL Bug#54461)
  • BZ - 640861 - CVE-2010-3839 MySQL: server hangs during JOIN query in stored procedures called twice in a row (MySQL Bug#53544)
  • BZ - 640865 - CVE-2010-3840 MySQL: crash when loading data into geometry function PolyFromWKB() (MySQL Bug#51875)

CVEs

  • CVE-2010-3840
  • CVE-2010-3681
  • CVE-2010-3839
  • CVE-2010-3835
  • CVE-2010-3836
  • CVE-2010-3837
  • CVE-2010-3833
  • CVE-2010-3682
  • CVE-2010-3680
  • CVE-2010-3838
  • CVE-2010-3677

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
mysql-5.0.77-4.el5_5.4.src.rpm SHA-256: 85c8e13977ffef369bbe9071cee059a56894e1980a041ef37b1c1aef7be3cd75
x86_64
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6
mysql-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 74d8de8ac61368bfff549203ea1157c202a480cab7eaccb693bba25c35ed8417
mysql-bench-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 6d563b980ad150e809522d24200b57f73f5c8c2b502398efe63a9da628ce3d0c
mysql-devel-5.0.77-4.el5_5.4.i386.rpm SHA-256: e204ce8e45b12e7190ba20861477819344489ed9aa8bf38b34b67102c3e2354e
mysql-devel-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 2b0b7b65ec7195cd95a3f981027528ac87644b1d4d8c96107c301ae5f6d30004
mysql-server-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 67fdd0e23dccf840787617219b65e9d6be0099219aa5b3683d7c72aa3d94d34e
mysql-test-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: e9ba117acdfd2d71bfa7d7f9eb5696bc5f05c50498d4191f11d97b0a0a2f2f5b
ia64
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6
mysql-5.0.77-4.el5_5.4.ia64.rpm SHA-256: 7f9447c625f275ba46af21aa484f80b8687ebf25fa0c924142edf149396fa8d6
mysql-bench-5.0.77-4.el5_5.4.ia64.rpm SHA-256: ba62b04fd9beedade5870d006025fa245bbebcfdb368d31d80e04c5347645cec
mysql-devel-5.0.77-4.el5_5.4.ia64.rpm SHA-256: 460d3e9d142a7e0ca9051f1e1ab505dff210a98b638435796ed19544fc78bb62
mysql-server-5.0.77-4.el5_5.4.ia64.rpm SHA-256: f498b2119549e03933f80a6ad49ce42101947e6e0ced015fe316640e73f7376f
mysql-test-5.0.77-4.el5_5.4.ia64.rpm SHA-256: adc8990e70b662203ec6211f36f623d94896f57399231f783e4156a377fdc4d1
i386
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6
mysql-bench-5.0.77-4.el5_5.4.i386.rpm SHA-256: bcaced470a9bbb8ddbb6cbd3372e0be5826d8f34cc63c7b88c56a5db8e893e05
mysql-devel-5.0.77-4.el5_5.4.i386.rpm SHA-256: e204ce8e45b12e7190ba20861477819344489ed9aa8bf38b34b67102c3e2354e
mysql-server-5.0.77-4.el5_5.4.i386.rpm SHA-256: dd00b6479b10ad5129217664f4e27c59103cf4a380cdc2a3799a8ba9d343702f
mysql-test-5.0.77-4.el5_5.4.i386.rpm SHA-256: a686a87a9f33e1f31ef7cc4957d226cef2e961077e9ac9663b8f98196de0b2ae

Red Hat Enterprise Linux Workstation 5

SRPM
mysql-5.0.77-4.el5_5.4.src.rpm SHA-256: 85c8e13977ffef369bbe9071cee059a56894e1980a041ef37b1c1aef7be3cd75
x86_64
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6
mysql-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 74d8de8ac61368bfff549203ea1157c202a480cab7eaccb693bba25c35ed8417
mysql-bench-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 6d563b980ad150e809522d24200b57f73f5c8c2b502398efe63a9da628ce3d0c
mysql-devel-5.0.77-4.el5_5.4.i386.rpm SHA-256: e204ce8e45b12e7190ba20861477819344489ed9aa8bf38b34b67102c3e2354e
mysql-devel-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 2b0b7b65ec7195cd95a3f981027528ac87644b1d4d8c96107c301ae5f6d30004
mysql-server-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 67fdd0e23dccf840787617219b65e9d6be0099219aa5b3683d7c72aa3d94d34e
mysql-test-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: e9ba117acdfd2d71bfa7d7f9eb5696bc5f05c50498d4191f11d97b0a0a2f2f5b
i386
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6
mysql-bench-5.0.77-4.el5_5.4.i386.rpm SHA-256: bcaced470a9bbb8ddbb6cbd3372e0be5826d8f34cc63c7b88c56a5db8e893e05
mysql-devel-5.0.77-4.el5_5.4.i386.rpm SHA-256: e204ce8e45b12e7190ba20861477819344489ed9aa8bf38b34b67102c3e2354e
mysql-server-5.0.77-4.el5_5.4.i386.rpm SHA-256: dd00b6479b10ad5129217664f4e27c59103cf4a380cdc2a3799a8ba9d343702f
mysql-test-5.0.77-4.el5_5.4.i386.rpm SHA-256: a686a87a9f33e1f31ef7cc4957d226cef2e961077e9ac9663b8f98196de0b2ae

Red Hat Enterprise Linux Desktop 5

SRPM
mysql-5.0.77-4.el5_5.4.src.rpm SHA-256: 85c8e13977ffef369bbe9071cee059a56894e1980a041ef37b1c1aef7be3cd75
x86_64
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6
mysql-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 74d8de8ac61368bfff549203ea1157c202a480cab7eaccb693bba25c35ed8417
i386
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
mysql-5.0.77-4.el5_5.4.src.rpm SHA-256: 85c8e13977ffef369bbe9071cee059a56894e1980a041ef37b1c1aef7be3cd75
s390x
mysql-5.0.77-4.el5_5.4.s390.rpm SHA-256: 1eeab151ce7478d1097c2b32138f586716457120482db159e92435f9bcf3c061
mysql-5.0.77-4.el5_5.4.s390x.rpm SHA-256: 2b4dde8775e4be07b26cb5ccdbf5ab92daa3fd9477e66533f600b3a4c6dfa3c5
mysql-bench-5.0.77-4.el5_5.4.s390x.rpm SHA-256: 9f78be722f49e9d77f5638da579a1e4504ca0e98355c1b000fca6f0e4a79bffb
mysql-devel-5.0.77-4.el5_5.4.s390.rpm SHA-256: 8c0e0eca91ecf4a8ae2b6c332df67facbd1b99a3fc86c6f970634219e525974d
mysql-devel-5.0.77-4.el5_5.4.s390x.rpm SHA-256: fc1a31ba5b9e8a3e06bbc36d803521578e902a8f3a5a6be592e4556961acf9ea
mysql-server-5.0.77-4.el5_5.4.s390x.rpm SHA-256: afcb6b20afa53706f04f2820e8bb973ef05fcfc10dba470758e0a8fd68c18562
mysql-test-5.0.77-4.el5_5.4.s390x.rpm SHA-256: 07ca0bd13e2e6a5f87342196b0d7ec2d415b5ab0a17a86bbe2038baca985edc5

Red Hat Enterprise Linux for Power, big endian 5

SRPM
mysql-5.0.77-4.el5_5.4.src.rpm SHA-256: 85c8e13977ffef369bbe9071cee059a56894e1980a041ef37b1c1aef7be3cd75
ppc
mysql-5.0.77-4.el5_5.4.ppc.rpm SHA-256: ebdc5b0d2bbb98000b32f69c079492d73c882fc7f2cb3c05cebfb0394121b13b
mysql-5.0.77-4.el5_5.4.ppc64.rpm SHA-256: 18d7c311703e440de4eb54ecd37644451c5703428b029e30875788642a7523dd
mysql-bench-5.0.77-4.el5_5.4.ppc.rpm SHA-256: f48af448a6ea2b54ca6dd5260ee5c0e124f53cf6eafc80efb7b7d33769df79ab
mysql-devel-5.0.77-4.el5_5.4.ppc.rpm SHA-256: c5047f9caa84adfd901bed442d280a6361a91cb5b7162a823eebed2a4e73e555
mysql-devel-5.0.77-4.el5_5.4.ppc64.rpm SHA-256: bb403f4bbbdfdb816efb3f5d01ff9475af7217e3dc96e666edf72e85c9ff4dd7
mysql-server-5.0.77-4.el5_5.4.ppc.rpm SHA-256: 06dde1ab006cc4961b145b7820a6367e4540d187f46f53be3e8b91660e1b8690
mysql-server-5.0.77-4.el5_5.4.ppc64.rpm SHA-256: d179c58c8cccd10981a98642319c8ac9ef306360f355de5cc851c0384e7be956
mysql-test-5.0.77-4.el5_5.4.ppc.rpm SHA-256: 5fdf00017e3803f279f75b6f56427f6472e51f11b6209a54194ff64d253ac09b

Red Hat Enterprise Linux Server from RHUI 5

SRPM
mysql-5.0.77-4.el5_5.4.src.rpm SHA-256: 85c8e13977ffef369bbe9071cee059a56894e1980a041ef37b1c1aef7be3cd75
x86_64
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6
mysql-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 74d8de8ac61368bfff549203ea1157c202a480cab7eaccb693bba25c35ed8417
mysql-bench-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 6d563b980ad150e809522d24200b57f73f5c8c2b502398efe63a9da628ce3d0c
mysql-devel-5.0.77-4.el5_5.4.i386.rpm SHA-256: e204ce8e45b12e7190ba20861477819344489ed9aa8bf38b34b67102c3e2354e
mysql-devel-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 2b0b7b65ec7195cd95a3f981027528ac87644b1d4d8c96107c301ae5f6d30004
mysql-server-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: 67fdd0e23dccf840787617219b65e9d6be0099219aa5b3683d7c72aa3d94d34e
mysql-test-5.0.77-4.el5_5.4.x86_64.rpm SHA-256: e9ba117acdfd2d71bfa7d7f9eb5696bc5f05c50498d4191f11d97b0a0a2f2f5b
i386
mysql-5.0.77-4.el5_5.4.i386.rpm SHA-256: b949ca401cef4951102da8287bee61ec0f4e4d7b6231b88c3ba706fbef0397d6
mysql-bench-5.0.77-4.el5_5.4.i386.rpm SHA-256: bcaced470a9bbb8ddbb6cbd3372e0be5826d8f34cc63c7b88c56a5db8e893e05
mysql-devel-5.0.77-4.el5_5.4.i386.rpm SHA-256: e204ce8e45b12e7190ba20861477819344489ed9aa8bf38b34b67102c3e2354e
mysql-server-5.0.77-4.el5_5.4.i386.rpm SHA-256: dd00b6479b10ad5129217664f4e27c59103cf4a380cdc2a3799a8ba9d343702f
mysql-test-5.0.77-4.el5_5.4.i386.rpm SHA-256: a686a87a9f33e1f31ef7cc4957d226cef2e961077e9ac9663b8f98196de0b2ae

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility