Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandriva: 2013:102: mariadb Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Updated mariadb packages includes fixes for the following security vulnerabilities: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote attackers to affect integrity [More...]

 Mandriva Linux Security Advisory                         MDVSA-2013:102

 Package : mariadb
 Date    : April 10, 2013
 Affected: Business Server 1.0

 Problem Description:

 Updated mariadb packages includes fixes for the following security
 Unspecified vulnerability in the MySQL Server component in Oracle
 MySQL 5.5.26 and earlier allows remote attackers to affect integrity
 and availability, related to MySQL Client (CVE-2012-3147).
 Unspecified vulnerability in the MySQL Server component in Oracle MySQL
 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers
 to affect confidentiality, integrity, and availability via unknown
 vectors related to Protocol (CVE-2012-3158).
 Multiple SQL injection vulnerabilities in the replication code in
 Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62,
 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25,
 allow remote authenticated users to execute arbitrary SQL commands
 via vectors related to the binary log. NOTE: as of 20130116, Oracle
 has not commented on claims from a downstream vendor that the fix in
 MySQL 5.5.29 is incomplete (CVE-2012-4414).
 Stack-based buffer overflow in the acl_get function in Oracle
 MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and
 other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a,
 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66,
 allows remote authenticated users to execute arbitrary code via a
 long argument to the GRANT FILE command (CVE-2012-5611).
 A buffer overflow that can cause a server crash or arbitrary code
 execution (a variant of CVE-2012-5611)
 Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions
 through 5.5.28, and MariaDB 5.5.28a and possibly other versions,
 allows remote authenticated users to cause a denial of service
 (memory corruption and crash) and possibly execute arbitrary code,
 as demonstrated using certain variations of the (1) USE, (2) SHOW
 TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands
 MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a, 5.3.11,
 5.2.13, 5.1.66, and possibly other versions, generates different error
 messages with different time delays depending on whether a user name
 exists, which allows remote attackers to enumerate valid usernames
 (CVE-2012-5615). Be advised that for CVE-2012-5615 to be completely
 closed, it's recommended to remove any anonymous logins. Previously,
 such a user without access rights was added by default.
 A vulnerability was found in the handling of password salt values in
 MySQL. When a user logs into MySQL a salt value is generated that
 is then used to prevent password guessing attacks (since the salt
 value must be known in order to send a password). This salt value is
 created at the start of a session and used for the entire session,
 once authenticated an attacker can use the MySQL change_user command
 to attempt to login as a different, as the salt value is known a
 password guessing attack will be much more efficient (CVE-2012-5627).
 in addition it fixes MDEV-4029 and rpl.rpl_mdev382 test from
 mariadb-bench, and a problem preventing the feedback plugin from
 working has been corrected.


 Updated Packages:

 Mandriva Business Server 1/X86_64:
 209fc8930bb829c3a4711086c02bb49d  mbs1/x86_64/lib64mariadb18-5.5.25-1.1.mbs1.x86_64.rpm
 566959cfc01bac6db75cfd9b9ae49502  mbs1/x86_64/lib64mariadb-devel-5.5.25-1.1.mbs1.x86_64.rpm
 75fd6b4a27fb22416e40fbea1dbad0d6  mbs1/x86_64/lib64mariadb-embedded18-5.5.25-1.1.mbs1.x86_64.rpm
 5d6f3c2d223d832671e01485cc50a5d4  mbs1/x86_64/lib64mariadb-embedded-devel-5.5.25-1.1.mbs1.x86_64.rpm
 4f0df298a0288393313939186ecda546  mbs1/x86_64/mariadb-5.5.25-1.1.mbs1.x86_64.rpm
 a8ed571f1da488b29e06d7418e340724  mbs1/x86_64/mariadb-bench-5.5.25-1.1.mbs1.x86_64.rpm
 7a3e50bbb6f3bf058efbddff77e33614  mbs1/x86_64/mariadb-client-5.5.25-1.1.mbs1.x86_64.rpm
 f1cf2b59445c4fe0628b53da20f0666b  mbs1/x86_64/mariadb-common-5.5.25-1.1.mbs1.x86_64.rpm
 f604904567f8a4a260933ee8e01c7214  mbs1/x86_64/mariadb-common-core-5.5.25-1.1.mbs1.x86_64.rpm
 5eca6d16415e101ad898823015ed799b  mbs1/x86_64/mariadb-core-5.5.25-1.1.mbs1.x86_64.rpm
 d37a4e03eaa52f3f3865a14b5d534b2c  mbs1/x86_64/mariadb-extra-5.5.25-1.1.mbs1.x86_64.rpm
 2494241e88fd57a50362363ac2329e96  mbs1/x86_64/mariadb-feedback-5.5.25-1.1.mbs1.x86_64.rpm
 948da86f587ca9f20dd91b6811c470a9  mbs1/x86_64/mariadb-obsolete-5.5.25-1.1.mbs1.x86_64.rpm
 f8ff932d77dd8969e3f6f9dd9664a89b  mbs1/x86_64/mysql-MariaDB-5.5.25-1.1.mbs1.x86_64.rpm 
 74885951ac551f63712b64f1f94f4b71  mbs1/SRPMS/mariadb-5.5.25-1.1.mbs1.src.rpm

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 You can view other update advisories for Mandriva Linux at:

 If you want to report vulnerabilities, please contact

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.