Lucene search

K
centosCentOS ProjectCESA-2007:1222-001
HistoryDec 22, 2007 - 2:26 p.m.

mysql security update

2007-12-2214:26:47
CentOS Project
lists.centos.org
45

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

0.032 Low

EPSS

Percentile

91.1%

CentOS Errata and Security Advisory CESA-2007:1222-001

MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
client/server implementation consisting of a server daemon (mysqld), and
many different client programs and libraries.

A flaw was found in a way MySQL handled symbolic links when database tables
were created with explicit β€œDATA” and β€œINDEX DIRECTORY” options. An
authenticated user could create a table that would overwrite tables in
other databases, causing destruction of data or allowing the user to
elevate privileges. (CVE-2007-5969)

A flaw was found in a way MySQL’s InnoDB engine handled spatial indexes. An
authenticated user could create a table with spatial indexes, which are not
supported by the InnoDB engine, that would cause the mysql daemon to crash
when used. This issue only causes a temporary denial of service, as the
mysql daemon will be automatically restarted after the crash.
(CVE-2007-5925)

A flaw was found in a way MySQL handled the β€œDEFINER” view parameter. A
user with the β€œALTER VIEW” privilege for a view created by another database
user, could modify that view to get access to any data accessible to the
creator of said view. (CVE-2007-6303)

All mysql users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-December/076717.html
https://lists.centos.org/pipermail/centos-announce/2007-December/076718.html

Affected packages:
mysql
mysql-bench
mysql-cluster
mysql-devel
mysql-libs
mysql-server
mysql-test

Upstream details at:
https://access.redhat.com/errata/RHSA-2007:1157

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

0.032 Low

EPSS

Percentile

91.1%