[Pkg-mysql-commits] r972 - branches/etch-5.0/debian
Christian Hammers
ch at alioth.debian.org
Tue Nov 6 22:49:39 UTC 2007
tags 424778 pending
tags 426353 pending
thanks
Author: ch
Date: 2007-11-06 22:49:39 +0000 (Tue, 06 Nov 2007)
New Revision: 972
Modified:
branches/etch-5.0/debian/changelog
Log:
made changelog look nicer
Modified: branches/etch-5.0/debian/changelog
===================================================================
--- branches/etch-5.0/debian/changelog 2007-11-06 22:43:44 UTC (rev 971)
+++ branches/etch-5.0/debian/changelog 2007-11-06 22:49:39 UTC (rev 972)
@@ -2,9 +2,17 @@
* Security release prepared for the security team by the Debian MySQL
maintainers. The patches were mostly taken from the Ubuntu project.
- * CVE-2007-2583: null dereference in item_cmpfunc.cc
- * CVE-2007-2691: DROP/RENAME TABLE statements (ref: #424778).
- * CVE-2007-2692: THD::db_access privileges (ref: #424830).
+ * CVE-2007-2583: The in_decimal::set function in item_cmpfunc.cc in MySQL
+ allowed context-dependent attackers to cause a denial of service (crash)
+ via a crafted IF clause that results in a divide-by-zero error and a NULL
+ pointer dereference. Closes: #426353
+ * CVE-2007-2691: MySQL did not require the DROP privilege for RENAME
+ TABLE statements, which allows remote authenticated users to rename
+ arbitrary tables. Closes: #424778
+ * CVE-2007-2692: The mysql_change_db function in MySQL did not restore
+ THD::db_access privileges when returning from SQL SECURITY INVOKER
+ stored routines, which allowed remote authenticated users to gain
+ privileges. Closes: #424778
* CVE-2007-3780: It was discovered that MySQL could be made to overflow
a signed char during authentication. Remote attackers could use crafted
authentication requests to cause a denial of service.
More information about the Pkg-mysql-commits
mailing list