OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Michael Schloh
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   13-Dec-2002 14:42:27
  Branch: HEAD                             Handle: 2002121313422600

  Added files:
    openpkg-web/security    OpenPKG-SA-2002.013-mysql.txt

  Log:
    New advisory for mysql security issues in OpenPKG current, and release 1.0 and
    1.1.

  Summary:
    Revision    Changes     Path
    1.1         +77 -0      openpkg-web/security/OpenPKG-SA-2002.013-mysql.txt
  ____________________________________________________________________________

  Index: openpkg-web/security/OpenPKG-SA-2002.013-mysql.txt
  ============================================================
  $ cvs update -p -r1.1 OpenPKG-SA-2002.013-mysql.txt
  ________________________________________________________________________
  
  OpenPKG Security Advisory                            The OpenPKG Project
  http://www.openpkg.org/security.html              http://www.openpkg.org
  [EMAIL PROTECTED]                         [EMAIL PROTECTED]
  OpenPKG-SA-2002.013                                          13-Dec-2002
  ________________________________________________________________________
  
  Package:             mysql
  Vulnerability:       password bypass, arbitrary code execution
  OpenPKG Specific:    no
  
  Dependent Packages:  apache, myodbc, perl-dbi, postfix
  
  Affected Releases:   Affected Packages:         Corrected Packages:
  OpenPKG 1.0          <= mysql-3.23.46-1.0.0     >= mysql-3.23.46-1.0.1
  OpenPKG 1.1          <= mysql-3.23.52-1.1.0     >= mysql-3.23.52-1.1.1
  OpenPKG CURRENT      <= mysql-3.23.53-20021204  >= mysql-3.23.54-20021212
  
  Description:
    The e-matters [0] company discovered two flaws [1] within the MySQL [2]
    server that can be used by any MySQL user to crash the server.  One of
    the flaws can be used to bypass the MySQL password check or to execute
    arbitrary code with the privileges of the user running mysqld.
  
    They also discovered an arbitrary size heap overflow within the mysql
    client library and another vulnerability that allows to write '\0' to
    any memory address. Both flaws could allow DOS attacks against or
    arbitrary code execution within anything linked against libmysqlclient.
  
    Check whether you are affected by running "<prefix>/bin/rpm -q mysql".
    If you have an affected version of the mysql package (see above), please
    upgrade it according to the solution below.
  
  Workaround:
  
  Solution:
    Update existing packages to newly patched versions of mysql. Select the
    updated source RPM appropriate for your OpenPKG release [3][4][5], and
    fetch it from the OpenPKG FTP service or a mirror location. Verify its
    integrity [6], build a corresponding binary RPM from it and update your
    OpenPKG installation by applying the binary RPM [7]. For the latest
    OpenPKG 1.1 release, perform the following operations to permanently fix
    the security problem (for other releases adjust accordingly).
  
    $ ftp ftp.openpkg.org
    ftp> bin
    ftp> cd release/1.1/UPD
    ftp> get mysql-3.23.52-1.1.1.src.rpm
    ftp> bye
    $ <prefix>/bin/rpm -v --checksig mysql-3.23.52-1.1.1.src.rpm
    $ <prefix>/bin/rpm --rebuild mysql-3.23.52-1.1.1.src.rpm
    $ su -
    # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/mysql-3.23.52-1.1.1.*.rpm
    # <prefix>/etc/rc mysql stop start
  ________________________________________________________________________
  
  References:
    [0]  http://www.e-matters.de/
    [1]  http://security.e-matters.de/advisories/042002.html
    [2]  http://www.mysql.com/
    [3]  ftp://ftp.openpkg.org/release/1.0/UPD/
    [4]  ftp://ftp.openpkg.org/release/1.1/UPD/
    [5]  ftp://ftp.openpkg.org/current/SRC/
    [6] http://www.openpkg.org/security.html#signature
    [7] http://www.openpkg.org/tutorial.html#regular-source
  ________________________________________________________________________
  
  For security reasons, this advisory was digitally signed with
  the OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F)
  of the OpenPKG project which you can find under the official URL
  http://www.openpkg.org/openpkg.pgp or on http://keyserver.pgp.com/. To
  check the integrity of this advisory, verify its digital signature by
  using GnuPG (http://www.gnupg.org/). For example, pipe this message to
  the command "gpg --verify --keyserver keyserver.pgp.com".
  ________________________________________________________________________
  
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to