TSLSA-2002-0086 - mysql

From: Trustix Secure Linux Advisor (tslat_private)
Date: Thu Dec 19 2002 - 11:51:36 PST

  • Next message: Damir Rajnovic: "Re: Cisco IOS EIGRP Network DoS"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    Trustix Secure Linux Security Advisory #2002-0086
    
    Package name:      mysql
    Summary:           Multiple issues
    Date:              2002-12-19
    Affected versions: TSL 1.5
    
    - --------------------------------------------------------------------------
    Package description:
      MySQL is a true multi-user, multi-threaded SQL (Structured Query
      Language) database server. MySQL is a client/server implementation
      that consists of a server daemon (mysqld) and many different client
      programs/libraries.
    
    
    Problem description:
      This release fixes the following issues:
      * Signed integer vulnerability in COM_TABLE_DUMP in the MySQL server
      * Password length vulnerability COM_CHANGE_USER in the MySQL server
      * read_rows overflow in the MySQL client libraries
      * read_one_row byte overwrites in the MySQL client libraries
    
    
    Action:
      We recommend that all systems with this package installed be upgraded.
      Please note that if you do not need the functionality provided by this
      package, you may want to remove it from your system.
    
    
    Location:
      All TSL updates are available from
      <URI:http://www.trustix.net/pub/Trustix/updates/>
      <URI:ftp://ftp.trustix.net/pub/Trustix/updates/>
    
    
    About Trustix Secure Linux:
      Trustix Secure Linux is a small Linux distribution for servers. With focus
      on security and stability, the system is painlessly kept safe and up to
      date from day one using swup, the automated software updater.
    
    
    Automatic updates:
      Users of the SWUP tool can enjoy having updates automatically
      installed using 'swup --upgrade'.
    
      Get SWUP from:
      <URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>
    
    
    Public testing:
      These packages have been available for public testing for some time.
      If you want to contribute by testing the various packages in the
      testing tree, please feel free to share your findings on the
      tsl-discuss mailinglist.
      The testing tree is located at
      <URI:http://www.trustix.net/pub/Trustix/testing/>
      <URI:ftp://ftp.trustix.net/pub/Trustix/testing/>
      
    
    Questions?
      Check out our mailing lists:
      <URI:http://www.trustix.net/support/>
    
    
    Verification:
      This advisory along with all TSL packages are signed with the TSL sign key.
      This key is available from:
      <URI:http://www.trustix.net/TSL-GPG-KEY>
    
      The advisory itself is available from the errata pages at
      <URI:http://www.trustix.net/errata/trustix-1.5/>
      or directly at
      <URI:http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt>
    
    
    MD5sums of the packages:
    - --------------------------------------------------------------------------
    de0b8637137ac292e9d90da5f689d776  ./1.5/RPMS/mysql-3.23.54a-1tr.i586.rpm
    b7dd8fdd0ec332942f68b2d6e2278114  ./1.5/RPMS/mysql-bench-3.23.54a-1tr.i586.rpm
    e25e5cf36241e8c233b133c6916fa24b  ./1.5/RPMS/mysql-client-3.23.54a-1tr.i586.rpm
    3ea335814acf1df461e329a6d693e9b7  ./1.5/RPMS/mysql-devel-3.23.54a-1tr.i586.rpm
    ea3d28332b197d47c9ba2ff89b141554  ./1.5/RPMS/mysql-shared-3.23.54a-1tr.i586.rpm
    0a188cc1ece8525071be69cebcc16b2c  ./1.5/SRPMS/mysql-3.23.54a-1tr.src.rpm
    - --------------------------------------------------------------------------
    
    
    Trustix Security Team
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE+AhWkwRTcg4BxxS0RAss2AKCE31cmtlfPDOkhk+VlSY0HH8psdQCffDKE
    mvL0bw07LHapDmwkqZqoUqs=
    =qPbW
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu Dec 19 2002 - 19:24:04 PST