MGASA-2013-0019
Date: | January 25th, 2013 |
Affected releases: | 2 |
Description:
Updated mariadb packages fix security vulnerability:
Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions
through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows
remote authenticated users to cause a denial of service (memory corruption
and crash) and possibly execute arbitrary code, as demonstrated using
certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE,
(4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM,
(7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM,
(11) UPDATE, and (12) SET PASSWORD commands (CVE-2012-5612).
Updated Packages:
i586:
libmariadb18-5.5.25-2.5.mga2.i586.rpm
libmariadb-devel-5.5.25-2.5.mga2.i586.rpm
libmariadb-embedded18-5.5.25-2.5.mga2.i586.rpm
libmariadb-embedded-devel-5.5.25-2.5.mga2.i586.rpm
mariadb-5.5.25-2.5.mga2.i586.rpm
mariadb-bench-5.5.25-2.5.mga2.i586.rpm
mariadb-client-5.5.25-2.5.mga2.i586.rpm
mariadb-common-5.5.25-2.5.mga2.i586.rpm
mariadb-common-core-5.5.25-2.5.mga2.i586.rpm
mariadb-core-5.5.25-2.5.mga2.i586.rpm
mariadb-extra-5.5.25-2.5.mga2.i586.rpm
mariadb-feedback-5.5.25-2.5.mga2.i586.rpm
mariadb-obsolete-5.5.25-2.5.mga2.i586.rpm
mysql-MariaDB-5.5.25-2.5.mga2.i586.rpm
x86_64:
lib64mariadb18-5.5.25-2.5.mga2.x86_64.rpm
lib64mariadb-devel-5.5.25-2.5.mga2.x86_64.rpm
lib64mariadb-embedded18-5.5.25-2.5.mga2.x86_64.rpm
lib64mariadb-embedded-devel-5.5.25-2.5.mga2.x86_64.rpm
mariadb-5.5.25-2.5.mga2.x86_64.rpm
mariadb-bench-5.5.25-2.5.mga2.x86_64.rpm
mariadb-client-5.5.25-2.5.mga2.x86_64.rpm
mariadb-common-5.5.25-2.5.mga2.x86_64.rpm
mariadb-common-core-5.5.25-2.5.mga2.x86_64.rpm
mariadb-core-5.5.25-2.5.mga2.x86_64.rpm
mariadb-extra-5.5.25-2.5.mga2.x86_64.rpm
mariadb-feedback-5.5.25-2.5.mga2.x86_64.rpm
mariadb-obsolete-5.5.25-2.5.mga2.x86_64.rpm
mysql-MariaDB-5.5.25-2.5.mga2.x86_64.rpm
SRPMS:
mariadb-5.5.25-2.5.mga2.src.rpm
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
https://mariadb.atlassian.net/browse/MDEV-3908
http://www.ubuntu.com/usn/usn-1703-1/
https://bugs.mageia.org/show_bug.cgi?id=8784