Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4B080756.1030705@redhat.com>
Date: Sat, 21 Nov 2009 16:29:26 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>,
        Sergei Golubchik <serg@...ql.com>
Subject: CVE Request - MySQL - 5.0.88

Hi Josh, Steve, vendors,

   MySQL upstream has released latest 5.0.88 version of their Community Server,
fixing one security issue:

Security Fix: MySQL clients linked against OpenSSL did not
               check server certificates presented by a server linked against
               yaSSL. (Bug#47320: http://bugs.mysql.com/47320)

While the other two (three issues) looks too to be security relevant:

* Error handling was missing for SELECT statements containing
   subqueries in the WHERE clause and that assigned a SELECT
   result to a user variable. The server could crash as a result.
   (Bug#48291: http://bugs.mysql.com/48291)

This looks to be from adjacent network exploitable mysqld DoS.

* If the first argument to GeomFromWKB() function was a geometry
   value, the function just returned its value. However, it
   failed to preserve the argument's null_value flag, which
   caused an unexpected NULL value to be returned to the caller,
   resulting in a server crash.
   (Bug#47780: http://bugs.mysql.com/47780)

Same case as the above, though I can't look into upstream MySQL bugs
to confirm or disprove it. Thus Cc-ed Sergei Golubchik on this mail.

* Failure to treat BIT values as unsigned could lead to
   unpredictable results.
  (Bug#42803: http://bugs.mysql.com/42803)

Also this one seems to be security related - upstream bug speaks about
invalid memory access and didn't check the code if this could
lead to heap overflow once the comparison fails.

Sergei, our opinion here is appreciated.

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.