USN-671-1: MySQL vulnerabilities
17 November 2008
MySQL vulnerabilities
Releases
Packages
Details
It was discovered that MySQL could be made to overwrite existing table
files in the data directory. An authenticated user could use the
DATA DIRECTORY and INDEX DIRECTORY options to possibly bypass privilege
checks. This update alters table creation behaviour by disallowing the
use of the MySQL data directory in DATA DIRECTORY and INDEX DIRECTORY
options. (CVE-2008-2079, CVE-2008-4097 and CVE-2008-4098)
It was discovered that MySQL did not handle empty bit-string literals
properly. An attacker could exploit this problem and cause the MySQL
server to crash, leading to a denial of service. (CVE-2008-3963)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.04
Ubuntu 7.10
Ubuntu 6.06
In general, a standard system upgrade is sufficient to effect the
necessary changes.
References
Related notices
- USN-1397-1: mysql-dfsg-5.1, mysql-server-5.1, mysql-server-5.0, mysql-5.1, mysql-dfsg-5.0
- USN-897-1: mysql-dfsg-5.1, mysql-server-5.1, mysql-server-5.0, mysql-dfsg-5.0