Debian alert: New mysql packages fix insecure temporary file creation

Posted by dave on Apr 14, 2004 9:06 AM EDT
Mailing list; By joey@infodrom.org (Martin Schulze)
Mail this story
Print this story

Two vulnerabilities have been discovered in mysql, a common database system. Two scripts contained in the package don't create temporary files in a secure fashion. This could allow a local attacker to overwrite files with the privileges of the user invoking the MySQL server, which is often the root user.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------- Debian Security Advisory DSA 483-1 [e-mail:security@debian.org] http://www.debian.org/security/ Martin Schulze April 14th, 2004 http://www.debian.org/security/faq - --------------------------------------------------------------------------

Package : mysql Vulnerability : insecure temporary file creation Problem-Type : local Debian-specific: no CVE IDs : CAN-2004-0381 CAN-2004-0388 Bugtraq ID : 9976

Two vulnerabilities have been discovered in mysql, a common database system. Two scripts contained in the package don't create temporary files in a secure fashion. This could allow a local attacker to overwrite files with the privileges of the user invoking the MySQL server, which is often the root user. The Common Vulnerabilities and Exposures identifies the following problems:

CAN-2004-0381

The script mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack.

CAN-2004-0388

The script mysqld_multi in MySQL allows local users to overwrite arbitrary files via a symlink attack.

For the stable distribution (woody) these problems have been fixed in version 3.23.49-8.6.

For the unstable distribution (sid) these problems will be fixed in version 4.0.18-6 of mysql-dfsg.

We recommend that you upgrade your mysql, mysql-dfsg and related packages.

Upgrade Instructions - --------------------

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody - --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49-8.6.dsc Size/MD5 checksum: 875 5ddb12f783b137adb3713eb833b2b62c http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49-8.6.diff.gz Size/MD5 checksum: 61688 651060d3e96cee5f78fa3a7627cd89a7 http://security.debian.org/pool/updates/main/m/mysql/mysql_3.23.49.orig.tar.gz Size/MD5 checksum: 11861035 a2820d81997779a9fdf1f4b3c321564a

Architecture independent components:

http://security.debian.org/pool/updates/main/m/mysql/mysql-common_3.23.49-8.6_all.deb Size/MD5 checksum: 16860 a38766469024146e445bff07f93e4954

Alpha architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_alpha.deb Size/MD5 checksum: 277662 54b823e4e25f4b8e260ac82539bdf84f http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_alpha.deb Size/MD5 checksum: 778718 e8d82f4d6e32a14e01e076314a094b03 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_alpha.deb Size/MD5 checksum: 163476 5bc948ab4f6ce862ebf9a64f2f7b6042 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_alpha.deb Size/MD5 checksum: 3634384 9d6e3871dfa018a87a516188e58dabfb

ARM architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_arm.deb Size/MD5 checksum: 238300 9caaa0c9a0d9909ef403f791c8ccf137 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_arm.deb Size/MD5 checksum: 634574 afc1a6cb70f1581a72b2f5904f8abf14 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_arm.deb Size/MD5 checksum: 123878 facc6f6326dc1080019fe54e7516c44a http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_arm.deb Size/MD5 checksum: 2805988 c38af448095a9358fe292f41c7f44fb1

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_i386.deb Size/MD5 checksum: 234634 5952137d0b86f6bfefd709ebfc0c624d http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_i386.deb Size/MD5 checksum: 576560 f8f9089209da42c1134f0157e62b4e49 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_i386.deb Size/MD5 checksum: 122462 148429934c68f10c291ae8ffe0a6db8c http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_i386.deb Size/MD5 checksum: 2800616 afd1dfcf5424f78ce7836c96b0dd92b1

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_ia64.deb Size/MD5 checksum: 315010 a8678f1aa73cb3a4fcbac4e479109311 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_ia64.deb Size/MD5 checksum: 848558 63f12a1295198c791956d3d9ba3e6364 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_ia64.deb Size/MD5 checksum: 173738 d83526ec16d5ba18b66bb4f0962c44f1 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_ia64.deb Size/MD5 checksum: 4000100 78c9cfd1bba1711338a557bd4737832f

HP Precision architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_hppa.deb Size/MD5 checksum: 280566 e11769ec989c98b9e857c30206246e95 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_hppa.deb Size/MD5 checksum: 743656 5fe1d40d737c3de61e7cf31183125526 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_hppa.deb Size/MD5 checksum: 140540 29f2b8d797afc05de720bbc4d4a517e9 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_hppa.deb Size/MD5 checksum: 3514794 42eaa54090fb0e6497cd1359f29e9304

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_m68k.deb Size/MD5 checksum: 227640 a7925061c360f47c83dcffd62b411358 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_m68k.deb Size/MD5 checksum: 557758 2545764c1f609dc28e4542e5f3d4b522 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_m68k.deb Size/MD5 checksum: 118356 47948f12e32fb25d7619c97b9f735486 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_m68k.deb Size/MD5 checksum: 2646508 9f49bf6d899ea6d768cfe51caa54c39c

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_mips.deb Size/MD5 checksum: 250892 4143d2fcad7a4b7f981fa666f6fdde65 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_mips.deb Size/MD5 checksum: 688998 e9da91c9477edd7b93ea71d96734ad4c http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_mips.deb Size/MD5 checksum: 133836 c2e14bd75e1a68dabfa6ef4d0002fb30 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_mips.deb Size/MD5 checksum: 2847932 696eac6a3c87c3ff747ed71d4ad03fe4

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_mipsel.deb Size/MD5 checksum: 250550 f9a25d5a5ec4225c95bb799afb8029c6 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_mipsel.deb Size/MD5 checksum: 688316 db428d75698cd72414b471d91615bd56 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_mipsel.deb Size/MD5 checksum: 134178 bf6e0a0eb74cc8d7c4afd19f4d05d635 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_mipsel.deb Size/MD5 checksum: 2839102 bff1d416c52801ef49af1ce4dcce8a17

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_powerpc.deb Size/MD5 checksum: 247660 4e4561d59aa84920423515c7f9177273 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_powerpc.deb Size/MD5 checksum: 652592 b9f51e0286c747fc58e2aeac9cf3c621 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_powerpc.deb Size/MD5 checksum: 129376 dc96676d319a7b0ee699b7f7f628e543 http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_powerpc.deb Size/MD5 checksum: 2823002 71952fc874cc70aa45a29bd6eb54cb50

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_s390.deb Size/MD5 checksum: 249960 0770d4308c3d28208bfc95f4d3473ae8 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_s390.deb Size/MD5 checksum: 607056 b77cf4690bb666dccd2edacbb06c09e5 http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_s390.deb Size/MD5 checksum: 126362 eb38bd8e3f363a37dfb54844702fc4fd http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_s390.deb Size/MD5 checksum: 2691074 2e56d9a296a5d87388f1660510c5f8b3

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10_3.23.49-8.6_sparc.deb Size/MD5 checksum: 241178 5afe949aaacf4e7b66d292ab4efc90c0 http://security.debian.org/pool/updates/main/m/mysql/libmysqlclient10-dev_3.23.49-8.6_sparc.deb Size/MD5 checksum: 615208 f117524a68678d8d3aac68260e6a24cd http://security.debian.org/pool/updates/main/m/mysql/mysql-client_3.23.49-8.6_sparc.deb Size/MD5 checksum: 130352 a3d97c6a8b9e3d460bb6cefab2f8d5fd http://security.debian.org/pool/updates/main/m/mysql/mysql-server_3.23.49-8.6_sparc.deb Size/MD5 checksum: 2939242 ef58492f8397d98a25277bccfdf96986

These files will probably be moved into the stable distribution on its next update.

- --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: [e-mail:debian-security-announce@lists.debian.org] Package info: 'apt-cache show ' and http://packages.debian.org/

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAfV21W5ql+IAeqTIRAiA+AJ9tayI2WATT8ObACOHavIqzvdl/UgCgkPhG XvpZT396zhQagsm1iqlF5B8= =+VhC -----END PGP SIGNATURE-----

-- To UNSUBSCRIBE, email to [e-mail:debian-security-announce-REQUEST@lists.debian.org] with a subject of "unsubscribe". Trouble? Contact [e-mail:listmaster@lists.debian.org]

[PARSEASHTML]

  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.