Date: Wed, 10 Sep 2014 10:29:32 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: CVE Assignments MITRE <cve-assign@...re.org> Subject: Re: CVE Request: MySQL: MyISAM temporary file issue Technically speaking Oracle is a CNA and should be handling this, I have no idea how to contact them though, Mitre, can you guys reach out to them? Also does this affect MariaDB? On 10/09/14 10:00 AM, Salvatore Bonaccorso wrote: > Hi > > The changes for MySQL 5.5.39 and 5.6.20 contain a reference to > the following issue, which could be exploited by a local user to run > arbitrary code in context of the mysqld server. > > MyISAM temporary files could be used to mount a code-execution attack. > (Bug #18045646). > > This is also tracked in and  mentioning as relevant fix . > > Was a CVE already requested for this issue? If not, could one be > assigned? > > Regards, > Salvatore > >  https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-39.html >  https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-20.html >  https://bugzilla.redhat.com/show_bug.cgi?id=1126271 >  https://bugs.gentoo.org/show_bug.cgi?id=518718 >  https://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/4638 > -- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ