[Pkg-mysql-commits] r972 - branches/etch-5.0/debian

Christian Hammers ch at alioth.debian.org
Tue Nov 6 22:49:39 UTC 2007


tags 424778 pending
tags 426353 pending
thanks

Author: ch
Date: 2007-11-06 22:49:39 +0000 (Tue, 06 Nov 2007)
New Revision: 972

Modified:
   branches/etch-5.0/debian/changelog
Log:
made changelog look nicer


Modified: branches/etch-5.0/debian/changelog
===================================================================
--- branches/etch-5.0/debian/changelog	2007-11-06 22:43:44 UTC (rev 971)
+++ branches/etch-5.0/debian/changelog	2007-11-06 22:49:39 UTC (rev 972)
@@ -2,9 +2,17 @@
 
   * Security release prepared for the security team by the Debian MySQL
     maintainers. The patches were mostly taken from the Ubuntu project.
-  * CVE-2007-2583: null dereference in item_cmpfunc.cc
-  * CVE-2007-2691: DROP/RENAME TABLE statements (ref: #424778).
-  * CVE-2007-2692: THD::db_access privileges (ref: #424830).
+  * CVE-2007-2583: The in_decimal::set function in item_cmpfunc.cc in MySQL 
+    allowed context-dependent attackers to cause a denial of service (crash)
+    via a crafted IF clause that results in a divide-by-zero error and a NULL
+    pointer dereference. Closes: #426353
+  * CVE-2007-2691: MySQL did not require the DROP privilege for RENAME 
+    TABLE statements, which allows remote authenticated users to rename 
+    arbitrary tables. Closes: #424778
+  * CVE-2007-2692: The mysql_change_db function in MySQL did not restore
+    THD::db_access privileges when returning from SQL SECURITY INVOKER 
+    stored routines, which allowed remote authenticated users to gain 
+    privileges. Closes: #424778
   * CVE-2007-3780: It was discovered that MySQL could be made to overflow 
     a signed char during authentication. Remote attackers could use crafted
     authentication requests to cause a denial of service.




More information about the Pkg-mysql-commits mailing list