OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Michael Schloh
Root: /v/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-web Date: 18-Apr-2005 16:46:45
Branch: HEAD Handle: 2005041815464500
Modified files:
openpkg-web/security OpenPKG-SA-2005.006-mysql.txt
Log:
complete edition, and prepare for signing
Summary:
Revision Changes Path
1.2 +17 -17 openpkg-web/security/OpenPKG-SA-2005.006-mysql.txt
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-web/security/OpenPKG-SA-2005.006-mysql.txt
============================================================================
$ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2005.006-mysql.txt
--- openpkg-web/security/OpenPKG-SA-2005.006-mysql.txt 15 Apr 2005
11:45:16 -0000 1.1
+++ openpkg-web/security/OpenPKG-SA-2005.006-mysql.txt 18 Apr 2005
14:46:45 -0000 1.2
@@ -3,7 +3,7 @@
OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
[EMAIL PROTECTED] [EMAIL PROTECTED]
-OpenPKG-SA-2006.006 15-Apr-2005
+OpenPKG-SA-2006.006 18-Apr-2005
________________________________________________________________________
Package: mysql
@@ -35,15 +35,15 @@
sendmail::with_mysql snort::with_mysql
Description:
- Several vulnerabilities ranging from insecure handling of temporary files
- to arbitrary code execution have been discovered in the MySQL RDBMS [0].
+ Several vulnerabilities including insecure handling of temporary files
+ and arbitrary code execution have been discovered in the MySQL RDBMS [0].
Javier Fernandez-Sanguino Pena found that users may overwrite arbitrary
files or read temporary files via a symlink attack on insecurely created
temporary files. The Common Vulnerabilities and Exposures (CVE) project
assigned the identifier CAN-2005-0004 [1] to this problem.
- Stefano Di Paola found that a user could load forbidden dynamic library
+ Stefano Di Paola found that users may load forbidden dynamic library
symbols with dlsym(3) to exploit a problem with user definable functions
(UDFs) logic and thereby remotely execute arbitrary code. The Common
Vulnerabilities and Exposures (CVE) project assigned the identifier
@@ -51,14 +51,14 @@
Stefano Di Paola also determined that incomplete testing of dynamic
library pathnames could lead to insecure loading of UDFs from dynamic
- libraries in arbitrary locations, again allowing a user to remotely
- execute arbitrary code. The Common Vulnerabilities and Exposures (CVE)
- project assigned the identifier CAN-2005-0710 [3] to this problem.
+ libraries in arbitrary locations, allowing users to remotely execute
+ arbitrary code. The Common Vulnerabilities and Exposures (CVE) project
+ assigned the identifier CAN-2005-0710 [3] to this problem.
Stefano Di Paola also discovered that creation of temporary tables uses
- predictable file names, allowing some users to overwrite arbitrary files
- via a symlink attack. The Common Vulnerabilities and Exposures (CVE)
- project assigned the identifier CAN-2005-0711 [4] to this problem.
+ predictable file names, allowing users to overwrite arbitrary files via
+ a symlink attack. The Common Vulnerabilities and Exposures (CVE) project
+ assigned the identifier CAN-2005-0711 [4] to this problem.
Please check whether you are affected by running "<prefix>/bin/openpkg
rpm -q mysql". If you have the "mysql" package installed and its
@@ -88,13 +88,13 @@
________________________________________________________________________
References:
- [0] http://www.mysql.com/
- [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004
- [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709
- [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710
- [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711
- [5] http://www.openpkg.org/tutorial.html#regular-source
- [6] http://www.openpkg.org/tutorial.html#regular-binary
+ [0] http://www.mysql.com/
+ [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004
+ [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709
+ [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710
+ [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711
+ [5] http://www.openpkg.org/tutorial.html#regular-source
+ [6] http://www.openpkg.org/tutorial.html#regular-binary
[7] ftp://ftp.openpkg.org/release/2.2/UPD/mysql-4.0.21-2.2.2.src.rpm
[8] ftp://ftp.openpkg.org/release/2.2/UPD/
[9] http://www.openpkg.org/security.html#signature
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [email protected]