Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 30 Nov 2009 11:55:48 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: MySQL Security Team <security@...ql.com>
Subject: Re: mysql-5.1.41


Here are the latest CVE assignments.  Because the symlink issues were not
completely fixed in earlier versions, they get new CVE IDs for later
versions.  (Downstream vendors might have fixed one issue, but not the
other.)

The 2008 CVE is for an issue that technically was disclosed in 2008.

Let me know if we've missed anything.

- Steve

======================================================
Name: CVE-2008-7247
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247
Reference: MLIST:[commits] 20081124 bzr commit into mysql-6.0-backup branch (ingo.struewing:2744) Bug#39277
Reference: URL:http://lists.mysql.com/commits/59711
Reference: MLIST:[oss-security] 20091124 Re: mysql-5.1.41
Reference: URL:http://marc.info/?l=oss-security&m=125908040022018&w=2
Reference: CONFIRM:http://bugs.mysql.com/bug.php?id=39277

sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41,
and 6.0 before 6.0.9-alpha, when the data home directory contains a
symlink to a different filesystem, allows remote authenticated users
to bypass intended access restrictions by calling CREATE TABLE with a
(1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a
subdirectory that requires following this symlink.


======================================================
Name: CVE-2009-4019
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4019
Reference: MLIST:[oss-security] 20091121 CVE Request - MySQL - 5.0.88
Reference: URL:http://marc.info/?l=oss-security&m=125881733826437&w=2
Reference: MLIST:[oss-security] 20091121 Re: CVE Request - MySQL - 5.0.88
Reference: URL:http://marc.info/?l=oss-security&m=125883754215621&w=2
Reference: MLIST:[oss-security] 20091123 Re: CVE Request - MySQL - 5.0.88
Reference: URL:http://marc.info/?l=oss-security&m=125901161824278&w=2
Reference: CONFIRM:http://bugs.mysql.com/47780
Reference: CONFIRM:http://bugs.mysql.com/48291
Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html

mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not
(1) properly handle errors during execution of certain SELECT
statements with subqueries, and does not (2) preserve certain
null_value flags during execution of statements that use the
GeomFromWKB function, which allows remote authenticated users to cause
a denial of service (daemon crash) via a crafted statement.


======================================================
Name: CVE-2009-4028
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4028
Reference: MLIST:[commits] 20091020 bzr commit into mysql-4.1 branch (joro:2709) Bug#47320
Reference: URL:http://lists.mysql.com/commits/87446
Reference: MLIST:[oss-security] 20091119 mysql-5.1.41
Reference: URL:http://www.openwall.com/lists/oss-security/2009/11/19/3
Reference: MLIST:[oss-security] 20091121 CVE Request - MySQL - 5.0.88
Reference: URL:http://marc.info/?l=oss-security&m=125881733826437&w=2
Reference: MLIST:[oss-security] 20091123 Re: mysql-5.1.41
Reference: URL:http://www.openwall.com/lists/oss-security/2009/11/23/16
Reference: CONFIRM:http://bugs.mysql.com/47320
Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html

The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x
before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a
value of zero for the depth of X.509 certificates, which allows
man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers
via a crafted certificate, as demonstrated by a certificate presented
by a server linked against the yaSSL library.


======================================================
Name: CVE-2009-4030
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030
Reference: MLIST:[commits] 20091110 bzr commit into mysql-5.0-bugteam branch (joro:2845) Bug#32167
Reference: URL:http://lists.mysql.com/commits/89940
Reference: MLIST:[oss-security] 20091119 mysql-5.1.41
Reference: URL:http://www.openwall.com/lists/oss-security/2009/11/19/3
Reference: MLIST:[oss-security] 20091124 Re: mysql-5.1.41
Reference: URL:http://marc.info/?l=oss-security&m=125908040022018&w=2
Reference: MLIST:[oss-security] 20091124 Re: mysql-5.1.41
Reference: URL:http://www.openwall.com/lists/oss-security/2009/11/24/6
Reference: MLIST:[oss-security] 20091124 Re: mysql-5.1.41
Reference: URL:http://marc.info/?l=oss-security&m=125908080222685&w=2
Reference: CONFIRM:http://bugs.mysql.com/bug.php?id=32167
Reference: CONFIRM:http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html

MySQL 5.1.x before 5.1.41 allows local users to bypass certain
privilege checks by calling CREATE TABLE on a MyISAM table with
modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are
originally associated with pathnames without symlinks, and that can
point to tables created at a future time at which a pathname is
modified to contain a symlink to a subdirectory of the MySQL data home
directory, related to incorrect calculation of the
mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists
because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.