Date: Wed, 10 Sep 2014 10:15:55 -0700 From: Ritwik Ghoshal <ritwik.ghoshal@...cle.com> To: oss-security@...ts.openwall.com CC: CVE Assignments MITRE <cve-assign@...re.org> Subject: Re: CVE Request: MySQL: MyISAM temporary file issue -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'll look into this and get back to you shortly. Thanks, - -Ritwik On 9/10/2014 9:29 AM, Kurt Seifried wrote: > Technically speaking Oracle is a CNA and should be handling this, I have > no idea how to contact them though, Mitre, can you guys reach out to > them? Also does this affect MariaDB? > > On 10/09/14 10:00 AM, Salvatore Bonaccorso wrote: >> Hi >> >> The changes for MySQL 5.5.39 and 5.6.20 contain a reference to >> the following issue, which could be exploited by a local user to run >> arbitrary code in context of the mysqld server. >> >> MyISAM temporary files could be used to mount a code-execution attack. >> (Bug #18045646). >> >> This is also tracked in and  mentioning as relevant fix . >> >> Was a CVE already requested for this issue? If not, could one be >> assigned? >> >> Regards, >> Salvatore >> >>  https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-39.html >>  https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-20.html >>  https://bugzilla.redhat.com/show_bug.cgi?id=1126271 >>  https://bugs.gentoo.org/show_bug.cgi?id=518718 >>  https://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/4638 >> > -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iQEcBAEBAgAGBQJUEIdFAAoJEB1zxS9196ou0qwIAIKBYjuDJJJPRHxCnTWacMrz ZQV/tZ7ajz2u0sY6m22Tpq1QUr5u4gf4rM6TL6MQS+r1Req4dsIXdicJvHrSQgmM N5yrWdbwMbx3mZOw0LZp/clV8fWJCb1e9IWckaWyn0IaDp/yyzQl7vHHmWvkOiUt qDUgpYbEVF8U/mrVYGT6Gmz3Rm8d9p9NcTRgxLoPShFKrwWlsDJoczdhE3UA+NTf sZ5n+q1hYmKymW300KcsSbV6JMvETAu6N5w48n2i8llFyiTkAGwjmtbVRjxbrLgw zHs6NVal793YUDRPFLeZxJV/0gkefxai7UfmXSe8z9ShtPE152GBoxN0TJsfKhQ= =+ZJ9 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ