Lucene search

K
osvGoogleOSV:DSA-2496-1
HistoryJun 18, 2012 - 12:00 a.m.

mysql-5.1 - several

2012-06-1800:00:00
Google
osv.dev
6

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.972 High

EPSS

Percentile

99.7%

Due to the non-disclosure of security patch information from Oracle,
we are forced to ship an upstream version update of MySQL 5.1.
There are several known incompatible
changes, which are listed in /usr/share/doc/mysql-server/NEWS.Debian.gz.

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to a new upstream
version, 5.1.63, which includes additional changes, such as performance
improvements and corrections for data loss defects. These changes are
described in the MySQL
release notes
.

CVE-2012-2122,
an authentication bypass vulnerability, occurs only when
MySQL has been built in with certain optimisations enabled. The packages
in Debian stable (squeeze) are not known to be affected by this
vulnerability. It is addressed in this update nonetheless, so future
rebuilds will not become vulnerable to this issue.

For the stable distribution (squeeze), these problems have been fixed in
version 5.1.63-0+squeeze1.

For the testing distribution (wheezy), these problems have been fixed
in version 5.1.62-1 of the mysql-5.1 package and version 5.5.24+dfsg-1
of the mysql-5.5 package.

We recommend that you upgrade your MySQL packages.

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.972 High

EPSS

Percentile

99.7%