Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:1002 - Security Advisory
Issued:
2010-12-21
Updated:
2010-12-21

RHSA-2010:1002 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: mod_auth_mysql security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated mod_auth_mysql package that fixes one security issue is now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The mod_auth_mysql package includes an extension module for the Apache HTTP
Server, which can be used to implement web user authentication against a
MySQL database.

A flaw was found in the way mod_auth_mysql escaped certain
multibyte-encoded strings. If mod_auth_mysql was configured to use a
multibyte character set that allowed a backslash ("\") as part of the
character encodings, a remote attacker could inject arbitrary SQL commands
into a login request. (CVE-2008-2384)

Note: This flaw only affected non-default installations where
AuthMySQLCharacterSet is configured to use one of the affected multibyte
character sets. Installations that did not use the AuthMySQLCharacterSet
configuration option were not vulnerable to this flaw.

All mod_auth_mysql users are advised to upgrade to this updated package,
which contains a backported patch to correct this issue. After installing
the updated package, the httpd daemon must be restarted for the update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 480238 - CVE-2008-2384 mod_auth_mysql: character encoding SQL injection flaw

CVEs

  • CVE-2008-2384

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
x86_64
mod_auth_mysql-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: d691940a6cf3312eed6558df893d42d6d3df85bdb544d6edd5ab6c9200642868
mod_auth_mysql-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: d691940a6cf3312eed6558df893d42d6d3df85bdb544d6edd5ab6c9200642868
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: 0b8f34543cfe6443e9f11fe1bcfb6699443b469218eabe0ac6230c43eed72817
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: 0b8f34543cfe6443e9f11fe1bcfb6699443b469218eabe0ac6230c43eed72817
i386
mod_auth_mysql-3.0.0-11.el6_0.1.i686.rpm SHA-256: 9880adbd2bebf6356d260d74e97e85fa3840eeb8ed763eed5859c8b38867b721
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.i686.rpm SHA-256: c5d2b0e65a41141612cd93133a0296188bb7e90446447b74aa6c08cb84d3f214

Red Hat Enterprise Linux Server from RHUI 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
x86_64
mod_auth_mysql-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: d691940a6cf3312eed6558df893d42d6d3df85bdb544d6edd5ab6c9200642868
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: 0b8f34543cfe6443e9f11fe1bcfb6699443b469218eabe0ac6230c43eed72817
i386
mod_auth_mysql-3.0.0-11.el6_0.1.i686.rpm SHA-256: 9880adbd2bebf6356d260d74e97e85fa3840eeb8ed763eed5859c8b38867b721
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.i686.rpm SHA-256: c5d2b0e65a41141612cd93133a0296188bb7e90446447b74aa6c08cb84d3f214

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
x86_64
mod_auth_mysql-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: d691940a6cf3312eed6558df893d42d6d3df85bdb544d6edd5ab6c9200642868
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: 0b8f34543cfe6443e9f11fe1bcfb6699443b469218eabe0ac6230c43eed72817
i386
mod_auth_mysql-3.0.0-11.el6_0.1.i686.rpm SHA-256: 9880adbd2bebf6356d260d74e97e85fa3840eeb8ed763eed5859c8b38867b721
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.i686.rpm SHA-256: c5d2b0e65a41141612cd93133a0296188bb7e90446447b74aa6c08cb84d3f214

Red Hat Enterprise Linux Workstation 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
x86_64
mod_auth_mysql-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: d691940a6cf3312eed6558df893d42d6d3df85bdb544d6edd5ab6c9200642868
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: 0b8f34543cfe6443e9f11fe1bcfb6699443b469218eabe0ac6230c43eed72817
i386
mod_auth_mysql-3.0.0-11.el6_0.1.i686.rpm SHA-256: 9880adbd2bebf6356d260d74e97e85fa3840eeb8ed763eed5859c8b38867b721
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.i686.rpm SHA-256: c5d2b0e65a41141612cd93133a0296188bb7e90446447b74aa6c08cb84d3f214

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
s390x
mod_auth_mysql-3.0.0-11.el6_0.1.s390x.rpm SHA-256: 3ddc2ecab72b76a61e40803e36a138a397cd39b9df6a325b01ad5ae95238d1c0
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.s390x.rpm SHA-256: 313a8aa57e71cfd589ac82d9cd060ffc2c967292d19da5bc5b2f37ceae576e68

Red Hat Enterprise Linux for Power, big endian 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
ppc64
mod_auth_mysql-3.0.0-11.el6_0.1.ppc64.rpm SHA-256: e773e7ee71cd99cb6235e0bb454f026322824f6f831c4a6d74f0757784a654dc
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.ppc64.rpm SHA-256: 23a24e98d0f9c35527bab67d96bc989c3e57b727fbda01051022b633d659c8b9

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
s390x
mod_auth_mysql-3.0.0-11.el6_0.1.s390x.rpm SHA-256: 3ddc2ecab72b76a61e40803e36a138a397cd39b9df6a325b01ad5ae95238d1c0
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.s390x.rpm SHA-256: 313a8aa57e71cfd589ac82d9cd060ffc2c967292d19da5bc5b2f37ceae576e68

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
x86_64
mod_auth_mysql-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: d691940a6cf3312eed6558df893d42d6d3df85bdb544d6edd5ab6c9200642868
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.x86_64.rpm SHA-256: 0b8f34543cfe6443e9f11fe1bcfb6699443b469218eabe0ac6230c43eed72817
i386
mod_auth_mysql-3.0.0-11.el6_0.1.i686.rpm SHA-256: 9880adbd2bebf6356d260d74e97e85fa3840eeb8ed763eed5859c8b38867b721
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.i686.rpm SHA-256: c5d2b0e65a41141612cd93133a0296188bb7e90446447b74aa6c08cb84d3f214

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
mod_auth_mysql-3.0.0-11.el6_0.1.src.rpm SHA-256: 4833ed9bce4098ccaf5c5e96e764457aa05416dcb0357310b1c70d049857e620
s390x
mod_auth_mysql-3.0.0-11.el6_0.1.s390x.rpm SHA-256: 3ddc2ecab72b76a61e40803e36a138a397cd39b9df6a325b01ad5ae95238d1c0
mod_auth_mysql-debuginfo-3.0.0-11.el6_0.1.s390x.rpm SHA-256: 313a8aa57e71cfd589ac82d9cd060ffc2c967292d19da5bc5b2f37ceae576e68

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility