Lucene search

K
centosCentOS ProjectCESA-2007:1155
HistoryDec 18, 2007 - 8:47 p.m.

mysql security update

2007-12-1820:47:57
CentOS Project
lists.centos.org
48

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

0.032 Low

EPSS

Percentile

91.1%

CentOS Errata and Security Advisory CESA-2007:1155

MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
client/server implementation consisting of a server daemon (mysqld), and
many different client programs and libraries.

A flaw was found in a way MySQL handled symbolic links when database tables
were created with explicit β€œDATA” and β€œINDEX DIRECTORY” options. An
authenticated user could create a table that would overwrite tables in
other databases, causing destruction of data or allowing the user to
elevate privileges. (CVE-2007-5969)

A flaw was found in a way MySQL’s InnoDB engine handled spatial indexes. An
authenticated user could create a table with spatial indexes, which are not
supported by the InnoDB engine, that would cause the mysql daemon to crash
when used. This issue only causes a temporary denial of service, as the
mysql daemon will be automatically restarted after the crash.
(CVE-2007-5925)

All mysql users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-December/076681.html
https://lists.centos.org/pipermail/centos-announce/2007-December/076682.html
https://lists.centos.org/pipermail/centos-announce/2007-December/076686.html
https://lists.centos.org/pipermail/centos-announce/2007-December/076687.html
https://lists.centos.org/pipermail/centos-announce/2007-December/076699.html
https://lists.centos.org/pipermail/centos-announce/2007-December/076700.html

Affected packages:
mysql
mysql-bench
mysql-devel
mysql-server
mysql-test

Upstream details at:
https://access.redhat.com/errata/RHSA-2007:1155

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

0.032 Low

EPSS

Percentile

91.1%