USN-950-1: MySQL vulnerabilities
9 June 2010
Releases
Packages
Details
It was discovered that MySQL did not check privileges before uninstalling
plugins. An authenticated user could uninstall arbitrary plugins, bypassing
intended restrictions. This issue only affected Ubuntu 9.10 and 10.04 LTS.
(CVE-2010-1621)
It was discovered that MySQL could be made to delete another user's data
and index files. An authenticated user could use symlinks combined with the
DROP TABLE command to possibly bypass privilege checks. (CVE-2010-1626)
It was discovered that MySQL incorrectly validated the table name argument
of the COM_FIELD_LIST command. An authenticated user could use a specially-
crafted table name to bypass privilege checks and possibly access other
tables. (CVE-2010-1848)
Eric Day discovered that MySQL incorrectly handled certain network packets.
A remote attacker could exploit this flaw and cause the server to consume
all available resources, resulting in a denial of service. (CVE-2010-1849)
It was discovered that MySQL performed incorrect bounds checking on the
table name argument of the COM_FIELD_LIST command. An authenticated user
could use a specially-crafted table name to cause a denial of service or
possibly execute arbitrary code. The default compiler options for affected
releases should reduce the vulnerability to a denial of service.
(CVE-2010-1850)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.10
Ubuntu 9.04
Ubuntu 8.04
Ubuntu 6.06
Ubuntu 10.04
In general, a standard system update will make all the necessary changes.
Related notices
- USN-1397-1: mysql-dfsg-5.0, mysql-5.1, mysql-server-5.1, mysql-server-5.0, mysql-dfsg-5.1