Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-4031
Vulnerability from cvelistv5
Published
2006-08-09 22:00
Modified
2024-08-07 18:57
Severity ?
EPSS score ?
Summary
MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:57:46.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21259" }, { "name": "21627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21627" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "SUSE-SR:2006:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "ADV-2006-3079", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "name": "19279", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19279" }, { "name": "USN-338-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31226" }, { "name": "oval:org.mitre.oval:def:10468", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "21382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21382" }, { "name": "MDKSA-2006:149", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22080" }, { "name": "21770", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21770" }, { "name": "21685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21685" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "1016617", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016617" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30351" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-568" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21259" }, { "name": "21627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21627" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "SUSE-SR:2006:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "ADV-2006-3079", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "name": "19279", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19279" }, { "name": "USN-338-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31226" }, { "name": "oval:org.mitre.oval:def:10468", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "21382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21382" }, { "name": "MDKSA-2006:149", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22080" }, { "name": "21770", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21770" }, { "name": "21685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21685" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "1016617", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016617" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30351" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-568" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21259", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21259" }, { "name": "21627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21627" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "SUSE-SR:2006:023", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "ADV-2006-3079", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "name": "19279", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19279" }, { "name": "USN-338-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "31226", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31226" }, { "name": "oval:org.mitre.oval:def:10468", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "21382", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21382" }, { "name": "MDKSA-2006:149", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22080" }, { "name": "21770", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21770" }, { "name": "21685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21685" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "1016617", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016617" }, { "name": "http://bugs.mysql.com/bug.php?id=15195", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "name": "30351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30351" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "https://issues.rpath.com/browse/RPL-568", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-568" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4031", "datePublished": "2006-08-09T22:00:00", "dateReserved": "2006-08-09T00:00:00", "dateUpdated": "2024-08-07T18:57:46.100Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-4031\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-08-09T22:04:00.000\",\"lastModified\":\"2024-11-21T00:14:58.740\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.\"},{\"lang\":\"es\",\"value\":\"MySQL 4.1 anterior a 4.1.21 y 5.0 anterior a 5.0.24 permite a usuarios locales acceder a una tabla a trav\u00e9s de una tabla MERGE previamente creada, incluso despu\u00e9s de que los privilegios del usuario han sido revocados para la tabla original, lo cual podr\u00eda violar la pol\u00edtica de seguridad pretendida.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFEDB808-A8D8-403E-9103-AB486C793EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C6AAD13-3CA1-4543-834B-39FB53D4462D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1CEA0B-1234-4166-BD32-CCBB4016A9BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADBEDF5A-5205-4012-B9B8-0FA304E7119A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF35900-4051-4E07-9BFA-347BEAB8AB67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC969A5-52CC-44F2-A929-DE559A5D7624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4D224C-8ABF-41A0-A7BE-C10C2387DE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C93CE88F-2941-4A08-9472-359CF214F81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77A2761-2B44-4061-9C29-A54F90A1AD83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B3AD851-056F-4E57-B85B-4AC5A5A20C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD24EA8C-4FCA-4F40-B2EA-7DFA49432483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754B78F2-A03C-40BE-812B-F5E57B93D20B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"575039BD-A8B6-4459-B5F0-F220A94650EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDA03768-74D2-4C5D-ABCF-8A91F9E6C273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"542B23CB-7535-4EF7-B926-466A5161A0D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E686C3-4100-465C-9F45-068580B496E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB618DB2-6B00-4E99-8232-937D2C51986B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"665E063D-355D-4A5A-A05F-36BF582DE36F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214E3CF9-6362-4F5A-91B7-5E69564F7144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45AD5549-07DC-43DA-B277-D7BF16ABE4E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787CB28C-74C6-4356-8AB3-4183CD941EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C30459B9-0FAC-48DF-9601-AAD1A028846F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DC48D3-09F1-48BD-A783-0549D4D5E8B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209E0C63-FC71-4E19-B3D5-BCB71A758252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48DBBAC9-AA05-409F-82B2-A552A3417E45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA087258-8A5B-472E-B120-9B56415F8869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"204CF85D-DFAD-4052-B24A-DCE09B32426E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"268CDE97-C837-482A-BB16-77662C45074C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E04B7CC-9E17-47AB-8923-A4DBD24119FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E441A8AB-8057-4C0F-A2D8-02CDB125B9CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0BE4B79-BF2A-4323-B337-62B388FCF9D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B78C9D8-E6BC-4D80-8C29-219C1F151570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72A7DE48-60E6-42FE-8986-0DB1647C1BFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E35942-7E70-468E-BA15-97CA5086C1B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCB886BB-EA7C-4618-9029-BB16A45A4301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56EC4832-82D1-4E57-86DA-8918CA006723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01D5DFB7-1AA6-468D-A077-5BB4B32C92B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C786D54-7DEC-41B8-A778-BED9DA66C3C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1BD316B-5855-462D-B378-6AAF9817F23D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38D864BB-32A6-44FC-870F-3663E53F2277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F5BA337-5845-4E3E-8DB5-AAB81A460376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC06D07-8C16-48D4-A95E-8F40CFAE6514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1B9CEC-580F-4143-B111-032195BCC760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F41E62F-A606-4842-985C-2B349C405E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"692E4E06-D559-4735-AED5-CE9E572CF608\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A42D3C-2539-469A-81BD-8306CD7E1A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8060F90A-968A-45EB-9CA2-E83E8D8F7BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BCEB43-67D4-4711-8C30-4D2D93159EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"362893B4-9BC1-4584-ACD5-08878A19E3C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD940715-318E-44C1-8613-FEBFB8F1741A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"167130D3-2AD2-4B82-B805-6A0BA45C4DCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17187451-7715-464D-9C7B-3F949345CF2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BFFFBBE-E604-4BCB-A143-E26CD91C0B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3658E1-B451-4B8B-A21A-3D66359D21DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041AD718-39A7-4B13-90C5-680743B1C982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2F4EA8-64A3-4E11-A6A3-5179738157D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067774E4-0704-4F5D-9B46-4DE19FE51163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD26FA75-C3C5-434C-9A82-E5F798A8E47C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77B463E6-DAD6-4013-8095-F0153F8B335F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C406CBD9-2656-4EC8-87FB-5E8A7F1D690F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA0C0EE5-B2AA-4862-B144-24733CC86A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"536F109A-7932-4424-889E-02922D8B783D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036AE068-C061-49B1-95D1-98A09A79EE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A83184-F554-42C0-8162-B484CBAD09D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC229C7C-BF4F-473B-BB01-BBD96CD06D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9244622-781A-46AE-866D-0EDDE5323048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA85DD18-19D9-4BF8-8420-DEA24AE44046\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670C3F10-A811-43D0-B762-5791D41C8B78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F379312-B95D-4C9B-918F-6A57B12EB5A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C36F606D-59B6-4FA0-8785-3B14592FE9CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2681F9FF-5899-4EFA-85A3-CEAB4402C786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A503C5-F2B8-4AFF-80F9-E035BAA68F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64B5AA62-1AFC-45E4-BC47-91BC852B3F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50FC2146-5BC0-4CA6-8700-5877C01B777D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F79AFBCE-FFF7-4348-BE17-42A7978E17E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A3C056E-EEB9-4B95-A155-F71B80B9695D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EFB2D10-E255-4DD3-BF03-217803CDED24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"436D90B0-C839-4B9F-853D-51C34459A11F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3535453-E7DC-4561-BB35-32DFF78E451C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A46F3F-7A97-4AE5-885B-15E25BC575C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37512B4B-C428-4D30-AAF3-9557C7257967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B1527A-5039-470B-87DC-B02F557364A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41BEAD26-ADDC-4FC6-A493-584315183936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"153E8DFB-4197-4117-87C6-C0FBE3C05600\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"765BF98E-7AB1-45EA-9935-2C311E621211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDCB80C-60B8-468E-A689-2C9DFF1F51C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22408224-0634-4CC6-888F-892E9D932CE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B2646B4-593E-4AC9-8292-1AD805632DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD959AEC-EE71-4E86-9AD0-ED6FF45AC848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30EC061-A04C-4402-91A0-B7E8DA9DBA5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D57E557-7F6D-4618-86AC-B10C08341900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECE1A40-0603-421E-BCCF-111EC3C2BCE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"B657610A-8EDB-407B-A81F-C3CDF2EF6ED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC10CD2-B9A3-46DD-839E-C7FB6647155F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D5D4B9-B831-4DDD-8FDD-3D14F167822A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC21395-4C78-4343-9452-578B24C2656D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21BC82AF-5E80-4AE4-A765-9D3725D9E5F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF2E25B-8689-4396-9C2B-99EEF4AB02BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5032D74E-CC8D-4217-AEF0-98DCD1820AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3340604-0D38-4494-847B-E9E8B0026A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC117BF1-3127-477A-9500-C9A32596ED8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC54D7B3-DC9B-43AC-BE10-565BDF292A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A7AC36-4E5D-483B-939E-257FDEDE48EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED5BA55-FF4F-4F89-89B1-554624DDA1AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0C43BB-81C6-496F-AC7B-61382DE76B71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C9FF055-99BC-4E15-80C8-80FEF3CBA990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6132F5E-ADE6-44C2-85BD-17408594789F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B6779AC-EF41-46B5-8B26-07FA2537E5B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F038AF5-C96C-43EE-9D46-1DD8CAF567EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E24BD3CF-0047-47F8-8B13-E2A6348E3924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7196E5-8483-4872-A78A-8BE7EC551CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"14DDA057-D211-42BD-B8AF-F250F1C5B88C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32CA2F70-77E4-4280-B845-4CE5774162C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA788329-9A66-49EA-B7E4-E465C0E7E320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66C06765-D153-4D4D-B8CD-DB2E386E082B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4297E6B7-6C5A-4D52-A66B-F9D1AE17E988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141D83A9-89C2-456F-B70D-F274EBE3EAC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6769975-47A4-4D0A-9181-F59776D13D38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E942FA-A458-4607-B48D-FCA112AFF1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E241159-FAA4-4DCF-AB68-BE36DF95D59A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6995B6-B594-454B-BD26-EACFB8241DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC14E107-7C11-4D5B-994B-CCACFD62097E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"19001041-22C4-4D2C-A918-378DACBB1DF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F610D56-6BB6-48FB-B43A-670CE9168500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1668BB5B-E7FB-4430-B8D5-89E308F5DD39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7777E919-FD4B-452B-88D7-165410C703F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C52D66-3BCA-4854-BF09-CB6DF1AC0E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF54CC8D-B736-461D-B693-686E862EF969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"053ACE9B-A146-42C0-ADB2-47F6119965D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B4F891-2A03-45A8-A49C-7F8B8F7D8407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E62AC4-954E-476C-98BE-C138E328AE7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B88385C-F5FB-401F-80D5-5BF11CE3C19D\"}]}]}],\"references\":[{\"url\":\"http://bugs.mysql.com/bug.php?id=15195\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305214\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21259\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21382\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21627\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21685\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21770\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22080\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30351\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31226\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016617\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:149\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_23_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0083.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0364.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0768.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19279\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-338-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3079\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0930\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-568\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.mysql.com/bug.php?id=15195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305214\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21685\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_23_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0083.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0364.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0768.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-338-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorSolution\":\"This vulnerability is addressed in the following product releases:\\r\\nMySQL, MySQL, 4.1.21 \\r\\nMySQL, MySQL, 5.0.24\",\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue was corrected in all affected mysql packages versions as shipped in Red Hat Enterprise Linux or Red Hat Application Stack via:\\n\\nhttps://rhn.redhat.com/errata/CVE-2006-4031.html\\n\\nThis issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3\",\"lastModified\":\"2008-07-25T00:00:00\"}]}}" } }
rhsa-2007_0083
Vulnerability from csaf_redhat
Published
2007-02-19 19:41
Modified
2024-11-22 01:46
Summary
Red Hat Security Advisory: mysql security update
Notes
Topic
Updated MySQL packages for the Red Hat Application Stack comprising the v1.1
release are now available.
This update also resolves some minor security issues rated as having low
security impact by the Red Hat Security Response Team.
Details
Several minor security issues were found in MySQL:
MySQL allowed remote authenticated users to create or access a database
when the database name differed only in case from a database for which they
had permissions. (CVE-2006-4226)
MySQL evaluated arguments in the wrong security context which allowed
remote authenticated users to gain privileges through a routine that had
been made available using GRANT EXECUTE. (CVE-2006-4227)
MySQL allowed a local user to access a table through a previously created
MERGE table, even after the user's privileges were revoked for the original
table, which might violate intended security policy. (CVE-2006-4031)
MySQL allowed authenticated users to cause a denial of service (crash) via
a NULL second argument to the str_to_date function. (CVE-2006-3081)
MySQL allowed local authenticated users to bypass logging mechanisms via
SQL queries that contain the NULL character, which were not properly
handled by the mysql_real_query function. (CVE-2006-0903)
Users of MySQL should upgrade to these updated packages, which resolve
these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated MySQL packages for the Red Hat Application Stack comprising the v1.1\nrelease are now available.\n\nThis update also resolves some minor security issues rated as having low\nsecurity impact by the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Several minor security issues were found in MySQL:\n\nMySQL allowed remote authenticated users to create or access a database\nwhen the database name differed only in case from a database for which they\nhad permissions. (CVE-2006-4226)\n\nMySQL evaluated arguments in the wrong security context which allowed\nremote authenticated users to gain privileges through a routine that had\nbeen made available using GRANT EXECUTE. (CVE-2006-4227)\n\nMySQL allowed a local user to access a table through a previously created\nMERGE table, even after the user\u0027s privileges were revoked for the original\ntable, which might violate intended security policy. (CVE-2006-4031)\n\nMySQL allowed authenticated users to cause a denial of service (crash) via\na NULL second argument to the str_to_date function. (CVE-2006-3081)\n\nMySQL allowed local authenticated users to bypass logging mechanisms via\nSQL queries that contain the NULL character, which were not properly\nhandled by the mysql_real_query function. (CVE-2006-0903)\n\nUsers of MySQL should upgrade to these updated packages, which resolve\nthese issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0083", "url": "https://access.redhat.com/errata/RHSA-2007:0083" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "228999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=228999" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0083.json" } ], "title": "Red Hat Security Advisory: mysql security update", "tracking": { "current_release_date": "2024-11-22T01:46:37+00:00", "generator": { "date": "2024-11-22T01:46:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0083", "initial_release_date": "2007-02-19T19:41:00+00:00", "revision_history": [ { "date": "2007-02-19T19:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-02-19T14:51:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:46:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product": { "name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_stack:1" } } }, { "category": "product_name", "name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product": { "name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_stack:1" } } } ], "category": "product_family", "name": "Red Hat Application Stack" }, { "branches": [ { "category": "product_version", "name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.30-1.el4s1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-server-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-server-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-test-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-test-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.30-1.el4s1.1?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-server-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-test-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-server-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-test-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0903", "discovery_date": "2006-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "194613" } ], "notes": [ { "category": "description", "text": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mysql log file obfuscation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0903" }, { "category": "external", "summary": "RHBZ#194613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=194613" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0903", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903" } ], "release_date": "2006-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Mysql log file obfuscation" }, { "cve": "CVE-2006-3081", "discovery_date": "2006-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618132" } ], "notes": [ { "category": "description", "text": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3081" }, { "category": "external", "summary": "RHBZ#1618132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618132" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081" } ], "release_date": "2006-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-4031", "discovery_date": "2006-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "202246" } ], "notes": [ { "category": "description", "text": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "MySQL improper permission revocation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4031" }, { "category": "external", "summary": "RHBZ#202246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=202246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4031", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031" } ], "release_date": "2005-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "MySQL improper permission revocation" }, { "cve": "CVE-2006-4226", "discovery_date": "2006-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "203428" } ], "notes": [ { "category": "description", "text": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql-server create database privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect Red Hat Enterprise Linux 2.1 or 3", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4226" }, { "category": "external", "summary": "RHBZ#203428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=203428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4226", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4226" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226" } ], "release_date": "2006-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql-server create database privilege escalation" }, { "cve": "CVE-2006-4227", "discovery_date": "2006-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "216427" } ], "notes": [ { "category": "description", "text": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql improper suid argument evaluation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4227" }, { "category": "external", "summary": "RHBZ#216427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216427" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4227", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4227" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227" } ], "release_date": "2006-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mysql improper suid argument evaluation" } ] }
rhsa-2008_0364
Vulnerability from csaf_redhat
Published
2008-05-20 12:44
Modified
2024-11-22 01:59
Summary
Red Hat Security Advisory: mysql security and bug fix update
Notes
Topic
Updated mysql packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
client/server implementation consisting of a server daemon (mysqld), and
many different client programs and libraries.
MySQL did not require privileges such as "SELECT" for the source table in a
"CREATE TABLE LIKE" statement. An authenticated user could obtain sensitive
information, such as the table structure. (CVE-2007-3781)
A flaw was discovered in MySQL that allowed an authenticated user to gain
update privileges for a table in another database, via a view that refers
to the external table. (CVE-2007-3782)
MySQL did not require the "DROP" privilege for "RENAME TABLE" statements.
An authenticated user could use this flaw to rename arbitrary tables.
(CVE-2007-2691)
A flaw was discovered in the mysql_change_db function when returning from
SQL SECURITY INVOKER stored routines. An authenticated user could use this
flaw to gain database privileges. (CVE-2007-2692)
MySQL allowed an authenticated user to bypass logging mechanisms via SQL
queries that contain the NULL character, which were not properly handled by
the mysql_real_query function. (CVE-2006-0903)
MySQL allowed an authenticated user to access a table through a previously
created MERGE table, even after the user's privileges were revoked from
the original table, which might violate intended security policy. This is
addressed by allowing the MERGE storage engine to be disabled, which can
be done by running mysqld with the "--skip-merge" option. (CVE-2006-4031)
MySQL evaluated arguments in the wrong security context, which allowed an
authenticated user to gain privileges through a routine that had been made
available using "GRANT EXECUTE". (CVE-2006-4227)
Multiple flaws in MySQL allowed an authenticated user to cause the MySQL
daemon to crash via crafted SQL queries. This only caused a temporary
denial of service, as the MySQL daemon is automatically restarted after the
crash. (CVE-2006-7232, CVE-2007-1420, CVE-2007-2583)
As well, these updated packages fix the following bugs:
* a separate counter was used for "insert delayed" statements, which caused
rows to be discarded. In these updated packages, "insert delayed"
statements no longer use a separate counter, which resolves this issue.
* due to a bug in the Native POSIX Thread Library, in certain situations,
"flush tables" caused a deadlock on tables that had a read lock. The mysqld
daemon had to be killed forcefully. Now, "COND_refresh" has been replaced
with "COND_global_read_lock", which resolves this issue.
* mysqld crashed if a query for an unsigned column type contained a
negative value for a "WHERE [column] NOT IN" subquery.
* in master and slave server situations, specifying "on duplicate key
update" for "insert" statements did not update slave servers.
* in the mysql client, empty strings were displayed as "NULL". For
example, running "insert into [table-name] values (' ');" resulted in a
"NULL" entry being displayed when querying the table using "select * from
[table-name];".
* a bug in the optimizer code resulted in certain queries executing much
slower than expected.
* on 64-bit PowerPC architectures, MySQL did not calculate the thread stack
size correctly, which could have caused MySQL to crash when overly-complex
queries were used.
Note: these updated packages upgrade MySQL to version 5.0.45. For a full
list of bug fixes and enhancements, refer to the MySQL release notes:
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0.html
All mysql users are advised to upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated mysql packages that fix various security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld), and\nmany different client programs and libraries.\n\nMySQL did not require privileges such as \"SELECT\" for the source table in a\n\"CREATE TABLE LIKE\" statement. An authenticated user could obtain sensitive\ninformation, such as the table structure. (CVE-2007-3781)\n\nA flaw was discovered in MySQL that allowed an authenticated user to gain\nupdate privileges for a table in another database, via a view that refers\nto the external table. (CVE-2007-3782)\n\nMySQL did not require the \"DROP\" privilege for \"RENAME TABLE\" statements.\nAn authenticated user could use this flaw to rename arbitrary tables.\n(CVE-2007-2691)\n\nA flaw was discovered in the mysql_change_db function when returning from\nSQL SECURITY INVOKER stored routines. An authenticated user could use this\nflaw to gain database privileges. (CVE-2007-2692)\n\nMySQL allowed an authenticated user to bypass logging mechanisms via SQL\nqueries that contain the NULL character, which were not properly handled by\nthe mysql_real_query function. (CVE-2006-0903)\n\nMySQL allowed an authenticated user to access a table through a previously\ncreated MERGE table, even after the user\u0027s privileges were revoked from\nthe original table, which might violate intended security policy. This is\naddressed by allowing the MERGE storage engine to be disabled, which can\nbe done by running mysqld with the \"--skip-merge\" option. (CVE-2006-4031)\n\nMySQL evaluated arguments in the wrong security context, which allowed an\nauthenticated user to gain privileges through a routine that had been made\navailable using \"GRANT EXECUTE\". (CVE-2006-4227)\n\nMultiple flaws in MySQL allowed an authenticated user to cause the MySQL\ndaemon to crash via crafted SQL queries. This only caused a temporary\ndenial of service, as the MySQL daemon is automatically restarted after the\ncrash. (CVE-2006-7232, CVE-2007-1420, CVE-2007-2583)\n\nAs well, these updated packages fix the following bugs:\n\n* a separate counter was used for \"insert delayed\" statements, which caused\nrows to be discarded. In these updated packages, \"insert delayed\"\nstatements no longer use a separate counter, which resolves this issue.\n\n* due to a bug in the Native POSIX Thread Library, in certain situations,\n\"flush tables\" caused a deadlock on tables that had a read lock. The mysqld\ndaemon had to be killed forcefully. Now, \"COND_refresh\" has been replaced\nwith \"COND_global_read_lock\", which resolves this issue.\n\n* mysqld crashed if a query for an unsigned column type contained a\nnegative value for a \"WHERE [column] NOT IN\" subquery.\n\n* in master and slave server situations, specifying \"on duplicate key\nupdate\" for \"insert\" statements did not update slave servers.\n\n* in the mysql client, empty strings were displayed as \"NULL\". For\nexample, running \"insert into [table-name] values (\u0027 \u0027);\" resulted in a\n\"NULL\" entry being displayed when querying the table using \"select * from\n[table-name];\".\n\n* a bug in the optimizer code resulted in certain queries executing much\nslower than expected.\n\n* on 64-bit PowerPC architectures, MySQL did not calculate the thread stack\nsize correctly, which could have caused MySQL to crash when overly-complex\nqueries were used.\n\nNote: these updated packages upgrade MySQL to version 5.0.45. For a full\nlist of bug fixes and enhancements, refer to the MySQL release notes:\nhttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0.html\n\nAll mysql users are advised to upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0364", "url": "https://access.redhat.com/errata/RHSA-2008:0364" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "194613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=194613" }, { "category": "external", "summary": "202246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=202246" }, { "category": "external", "summary": "216427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216427" }, { "category": "external", "summary": "232603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=232603" }, { "category": "external", "summary": "240813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240813" }, { "category": "external", "summary": "241688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241688" }, { "category": "external", "summary": "241689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241689" }, { "category": "external", "summary": "248553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248553" }, { "category": "external", "summary": "254012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254012" }, { "category": "external", "summary": "256501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=256501" }, { "category": "external", "summary": "349121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=349121" }, { "category": "external", "summary": "434264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434264" }, { "category": "external", "summary": "435391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435391" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0364.json" } ], "title": "Red Hat Security Advisory: mysql security and bug fix update", "tracking": { "current_release_date": "2024-11-22T01:59:09+00:00", "generator": { "date": "2024-11-22T01:59:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0364", "initial_release_date": "2008-05-20T12:44:00+00:00", "revision_history": [ { "date": "2008-05-20T12:44:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-20T08:44:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:59:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.45-7.el5.x86_64", "product": { "name": "mysql-debuginfo-0:5.0.45-7.el5.x86_64", "product_id": "mysql-debuginfo-0:5.0.45-7.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.45-7.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.45-7.el5.x86_64", "product": { "name": "mysql-bench-0:5.0.45-7.el5.x86_64", "product_id": "mysql-bench-0:5.0.45-7.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.45-7.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.45-7.el5.x86_64", "product": { "name": "mysql-server-0:5.0.45-7.el5.x86_64", "product_id": "mysql-server-0:5.0.45-7.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.45-7.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.45-7.el5.x86_64", "product": { "name": "mysql-test-0:5.0.45-7.el5.x86_64", "product_id": "mysql-test-0:5.0.45-7.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.45-7.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.45-7.el5.x86_64", "product": { "name": "mysql-devel-0:5.0.45-7.el5.x86_64", "product_id": "mysql-devel-0:5.0.45-7.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.45-7.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-0:5.0.45-7.el5.x86_64", "product": { "name": "mysql-0:5.0.45-7.el5.x86_64", "product_id": "mysql-0:5.0.45-7.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.45-7.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.45-7.el5.i386", "product": { "name": "mysql-debuginfo-0:5.0.45-7.el5.i386", "product_id": "mysql-debuginfo-0:5.0.45-7.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.45-7.el5?arch=i386" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.45-7.el5.i386", "product": { "name": "mysql-devel-0:5.0.45-7.el5.i386", "product_id": "mysql-devel-0:5.0.45-7.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.45-7.el5?arch=i386" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.45-7.el5.i386", "product": { "name": "mysql-bench-0:5.0.45-7.el5.i386", "product_id": "mysql-bench-0:5.0.45-7.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.45-7.el5?arch=i386" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.45-7.el5.i386", "product": { "name": "mysql-server-0:5.0.45-7.el5.i386", "product_id": "mysql-server-0:5.0.45-7.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.45-7.el5?arch=i386" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.45-7.el5.i386", "product": { "name": "mysql-test-0:5.0.45-7.el5.i386", "product_id": "mysql-test-0:5.0.45-7.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.45-7.el5?arch=i386" } } }, { "category": "product_version", "name": "mysql-0:5.0.45-7.el5.i386", "product": { "name": "mysql-0:5.0.45-7.el5.i386", "product_id": "mysql-0:5.0.45-7.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.45-7.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mysql-0:5.0.45-7.el5.src", "product": { "name": "mysql-0:5.0.45-7.el5.src", "product_id": "mysql-0:5.0.45-7.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.45-7.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.45-7.el5.ia64", "product": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ia64", "product_id": "mysql-debuginfo-0:5.0.45-7.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.45-7.el5?arch=ia64" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.45-7.el5.ia64", "product": { "name": "mysql-bench-0:5.0.45-7.el5.ia64", "product_id": "mysql-bench-0:5.0.45-7.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.45-7.el5?arch=ia64" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.45-7.el5.ia64", "product": { "name": "mysql-server-0:5.0.45-7.el5.ia64", "product_id": "mysql-server-0:5.0.45-7.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.45-7.el5?arch=ia64" } } }, { "category": "product_version", "name": "mysql-0:5.0.45-7.el5.ia64", "product": { "name": "mysql-0:5.0.45-7.el5.ia64", "product_id": "mysql-0:5.0.45-7.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.45-7.el5?arch=ia64" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.45-7.el5.ia64", "product": { "name": "mysql-test-0:5.0.45-7.el5.ia64", "product_id": "mysql-test-0:5.0.45-7.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.45-7.el5?arch=ia64" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.45-7.el5.ia64", "product": { "name": "mysql-devel-0:5.0.45-7.el5.ia64", "product_id": "mysql-devel-0:5.0.45-7.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.45-7.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc64", "product": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc64", "product_id": "mysql-debuginfo-0:5.0.45-7.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.45-7.el5?arch=ppc64" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.45-7.el5.ppc64", "product": { "name": "mysql-server-0:5.0.45-7.el5.ppc64", "product_id": "mysql-server-0:5.0.45-7.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.45-7.el5?arch=ppc64" } } }, { "category": "product_version", "name": "mysql-0:5.0.45-7.el5.ppc64", "product": { "name": "mysql-0:5.0.45-7.el5.ppc64", "product_id": "mysql-0:5.0.45-7.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.45-7.el5?arch=ppc64" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.45-7.el5.ppc64", "product": { "name": "mysql-devel-0:5.0.45-7.el5.ppc64", "product_id": "mysql-devel-0:5.0.45-7.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.45-7.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc", "product": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc", "product_id": "mysql-debuginfo-0:5.0.45-7.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.45-7.el5?arch=ppc" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.45-7.el5.ppc", "product": { "name": "mysql-bench-0:5.0.45-7.el5.ppc", "product_id": "mysql-bench-0:5.0.45-7.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.45-7.el5?arch=ppc" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.45-7.el5.ppc", "product": { "name": "mysql-server-0:5.0.45-7.el5.ppc", "product_id": "mysql-server-0:5.0.45-7.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.45-7.el5?arch=ppc" } } }, { "category": "product_version", "name": "mysql-0:5.0.45-7.el5.ppc", "product": { "name": "mysql-0:5.0.45-7.el5.ppc", "product_id": "mysql-0:5.0.45-7.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.45-7.el5?arch=ppc" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.45-7.el5.ppc", "product": { "name": "mysql-test-0:5.0.45-7.el5.ppc", "product_id": "mysql-test-0:5.0.45-7.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.45-7.el5?arch=ppc" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.45-7.el5.ppc", "product": { "name": "mysql-devel-0:5.0.45-7.el5.ppc", "product_id": "mysql-devel-0:5.0.45-7.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.45-7.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.45-7.el5.s390x", "product": { "name": "mysql-debuginfo-0:5.0.45-7.el5.s390x", "product_id": "mysql-debuginfo-0:5.0.45-7.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.45-7.el5?arch=s390x" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.45-7.el5.s390x", "product": { "name": "mysql-bench-0:5.0.45-7.el5.s390x", "product_id": "mysql-bench-0:5.0.45-7.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.45-7.el5?arch=s390x" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.45-7.el5.s390x", "product": { "name": "mysql-server-0:5.0.45-7.el5.s390x", "product_id": "mysql-server-0:5.0.45-7.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.45-7.el5?arch=s390x" } } }, { "category": "product_version", "name": "mysql-0:5.0.45-7.el5.s390x", "product": { "name": "mysql-0:5.0.45-7.el5.s390x", "product_id": "mysql-0:5.0.45-7.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.45-7.el5?arch=s390x" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.45-7.el5.s390x", "product": { "name": "mysql-test-0:5.0.45-7.el5.s390x", "product_id": "mysql-test-0:5.0.45-7.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.45-7.el5?arch=s390x" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.45-7.el5.s390x", "product": { "name": "mysql-devel-0:5.0.45-7.el5.s390x", "product_id": "mysql-devel-0:5.0.45-7.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.45-7.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.45-7.el5.s390", "product": { "name": "mysql-debuginfo-0:5.0.45-7.el5.s390", "product_id": "mysql-debuginfo-0:5.0.45-7.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.45-7.el5?arch=s390" } } }, { "category": "product_version", "name": "mysql-0:5.0.45-7.el5.s390", "product": { "name": "mysql-0:5.0.45-7.el5.s390", "product_id": "mysql-0:5.0.45-7.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.45-7.el5?arch=s390" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.45-7.el5.s390", "product": { "name": "mysql-devel-0:5.0.45-7.el5.s390", "product_id": "mysql-devel-0:5.0.45-7.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.45-7.el5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-0:5.0.45-7.el5.src" }, "product_reference": "mysql-0:5.0.45-7.el5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-server-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-server-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-test-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-test-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-test-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-test-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-test-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-0:5.0.45-7.el5.src" }, "product_reference": "mysql-0:5.0.45-7.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-bench-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-bench-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-bench-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-bench-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-bench-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-devel-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-devel-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-devel-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-devel-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-devel-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-devel-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-devel-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-server-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-server-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-server-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-server-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-server-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-server-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-server-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-server-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-test-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-test-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-test-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-test-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-test-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-test-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-test-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-test-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mysql-test-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-test-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-0:5.0.45-7.el5.src" }, "product_reference": "mysql-0:5.0.45-7.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-bench-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-bench-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-bench-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-bench-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-bench-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-bench-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-devel-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-devel-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-devel-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-devel-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-devel-0:5.0.45-7.el5.s390" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-devel-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-devel-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-devel-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-server-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-server-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-server-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-server-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-server-0:5.0.45-7.el5.ppc64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-server-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-server-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-server-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-server-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-test-0:5.0.45-7.el5.i386" }, "product_reference": "mysql-test-0:5.0.45-7.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-test-0:5.0.45-7.el5.ia64" }, "product_reference": "mysql-test-0:5.0.45-7.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-test-0:5.0.45-7.el5.ppc" }, "product_reference": "mysql-test-0:5.0.45-7.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-test-0:5.0.45-7.el5.s390x" }, "product_reference": "mysql-test-0:5.0.45-7.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.45-7.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mysql-test-0:5.0.45-7.el5.x86_64" }, "product_reference": "mysql-test-0:5.0.45-7.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0903", "discovery_date": "2006-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "194613" } ], "notes": [ { "category": "description", "text": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mysql log file obfuscation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0903" }, { "category": "external", "summary": "RHBZ#194613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=194613" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0903", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903" } ], "release_date": "2006-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Mysql log file obfuscation" }, { "cve": "CVE-2006-4031", "discovery_date": "2006-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "202246" } ], "notes": [ { "category": "description", "text": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "MySQL improper permission revocation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4031" }, { "category": "external", "summary": "RHBZ#202246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=202246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4031", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031" } ], "release_date": "2005-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "MySQL improper permission revocation" }, { "cve": "CVE-2006-4227", "discovery_date": "2006-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "216427" } ], "notes": [ { "category": "description", "text": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql improper suid argument evaluation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4227" }, { "category": "external", "summary": "RHBZ#216427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216427" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4227", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4227" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227" } ], "release_date": "2006-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mysql improper suid argument evaluation" }, { "cve": "CVE-2006-7232", "discovery_date": "2008-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "434264" } ], "notes": [ { "category": "description", "text": "sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql: daemon crash via EXPLAIN on queries on information schema", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the MySQL packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4 as they did not support INFORMATION_SCHEMA, introduced in MySQL version 5.\n\nThe MySQL packages as shipped in Red Hat Application Stack v1 and v2 are based on upstream version which has the fix included.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-7232" }, { "category": "external", "summary": "RHBZ#434264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=434264" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-7232", "url": "https://www.cve.org/CVERecord?id=CVE-2006-7232" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7232", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7232" } ], "release_date": "2006-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql: daemon crash via EXPLAIN on queries on information schema" }, { "cve": "CVE-2007-1420", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2007-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "232603" } ], "notes": [ { "category": "description", "text": "MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Single MySQL worker can be crashed (NULL deref) with certain SELECT statements", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-1420" }, { "category": "external", "summary": "RHBZ#232603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=232603" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1420", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1420" } ], "release_date": "2007-03-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Single MySQL worker can be crashed (NULL deref) with certain SELECT statements" }, { "cve": "CVE-2007-2583", "discovery_date": "2007-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "240813" } ], "notes": [ { "category": "description", "text": "The in_decimal::set function in item_cmpfunc.cc in MySQL before 5.0.40, and 5.1 before 5.1.18-beta, allows context-dependent attackers to cause a denial of service (crash) via a crafted IF clause that results in a divide-by-zero error and a NULL pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql: DoS via statement with crafted IF clause", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2583" }, { "category": "external", "summary": "RHBZ#240813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2583", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2583" } ], "release_date": "2007-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql: DoS via statement with crafted IF clause" }, { "cve": "CVE-2007-2691", "discovery_date": "2007-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "241688" } ], "notes": [ { "category": "description", "text": "MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql DROP privilege not enforced when renaming tables", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2691" }, { "category": "external", "summary": "RHBZ#241688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2691", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2691" } ], "release_date": "2007-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql DROP privilege not enforced when renaming tables" }, { "cve": "CVE-2007-2692", "discovery_date": "2007-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "241689" } ], "notes": [ { "category": "description", "text": "The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql SECURITY INVOKER functions do not drop privileges", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3 and 4.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2692" }, { "category": "external", "summary": "RHBZ#241689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2692", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2692" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2692", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2692" } ], "release_date": "2007-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql SECURITY INVOKER functions do not drop privileges" }, { "cve": "CVE-2007-3781", "discovery_date": "2007-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "248553" } ], "notes": [ { "category": "description", "text": "MySQL Community Server before 5.0.45 does not require privileges such as SELECT for the source table in a CREATE TABLE LIKE statement, which allows remote authenticated users to obtain sensitive information such as the table structure.", "title": "Vulnerability description" }, { "category": "summary", "text": "New release of MySQL fixes security bugs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248553\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3781" }, { "category": "external", "summary": "RHBZ#248553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3781", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3781" } ], "release_date": "2007-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "New release of MySQL fixes security bugs" }, { "cve": "CVE-2007-3782", "discovery_date": "2007-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "248553" } ], "notes": [ { "category": "description", "text": "MySQL Community Server before 5.0.45 allows remote authenticated users to gain update privileges for a table in another database via a view that refers to this external table.", "title": "Vulnerability description" }, { "category": "summary", "text": "New release of MySQL fixes security bugs", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248553\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3782" }, { "category": "external", "summary": "RHBZ#248553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3782", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3782" } ], "release_date": "2007-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T12:44:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:mysql-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-0:5.0.45-7.el5.src", "5Client-Workstation:mysql-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.ppc64", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-server-0:5.0.45-7.el5.x86_64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.i386", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ia64", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.ppc", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.s390x", "5Client-Workstation:mysql-test-0:5.0.45-7.el5.x86_64", "5Client:mysql-0:5.0.45-7.el5.i386", "5Client:mysql-0:5.0.45-7.el5.ia64", "5Client:mysql-0:5.0.45-7.el5.ppc", "5Client:mysql-0:5.0.45-7.el5.ppc64", "5Client:mysql-0:5.0.45-7.el5.s390", "5Client:mysql-0:5.0.45-7.el5.s390x", "5Client:mysql-0:5.0.45-7.el5.src", "5Client:mysql-0:5.0.45-7.el5.x86_64", "5Client:mysql-bench-0:5.0.45-7.el5.i386", "5Client:mysql-bench-0:5.0.45-7.el5.ia64", "5Client:mysql-bench-0:5.0.45-7.el5.ppc", "5Client:mysql-bench-0:5.0.45-7.el5.s390x", "5Client:mysql-bench-0:5.0.45-7.el5.x86_64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Client:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Client:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Client:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Client:mysql-devel-0:5.0.45-7.el5.i386", "5Client:mysql-devel-0:5.0.45-7.el5.ia64", "5Client:mysql-devel-0:5.0.45-7.el5.ppc", "5Client:mysql-devel-0:5.0.45-7.el5.ppc64", "5Client:mysql-devel-0:5.0.45-7.el5.s390", "5Client:mysql-devel-0:5.0.45-7.el5.s390x", "5Client:mysql-devel-0:5.0.45-7.el5.x86_64", "5Client:mysql-server-0:5.0.45-7.el5.i386", "5Client:mysql-server-0:5.0.45-7.el5.ia64", "5Client:mysql-server-0:5.0.45-7.el5.ppc", "5Client:mysql-server-0:5.0.45-7.el5.ppc64", "5Client:mysql-server-0:5.0.45-7.el5.s390x", "5Client:mysql-server-0:5.0.45-7.el5.x86_64", "5Client:mysql-test-0:5.0.45-7.el5.i386", "5Client:mysql-test-0:5.0.45-7.el5.ia64", "5Client:mysql-test-0:5.0.45-7.el5.ppc", "5Client:mysql-test-0:5.0.45-7.el5.s390x", "5Client:mysql-test-0:5.0.45-7.el5.x86_64", "5Server:mysql-0:5.0.45-7.el5.i386", "5Server:mysql-0:5.0.45-7.el5.ia64", "5Server:mysql-0:5.0.45-7.el5.ppc", "5Server:mysql-0:5.0.45-7.el5.ppc64", "5Server:mysql-0:5.0.45-7.el5.s390", "5Server:mysql-0:5.0.45-7.el5.s390x", "5Server:mysql-0:5.0.45-7.el5.src", "5Server:mysql-0:5.0.45-7.el5.x86_64", "5Server:mysql-bench-0:5.0.45-7.el5.i386", "5Server:mysql-bench-0:5.0.45-7.el5.ia64", "5Server:mysql-bench-0:5.0.45-7.el5.ppc", "5Server:mysql-bench-0:5.0.45-7.el5.s390x", "5Server:mysql-bench-0:5.0.45-7.el5.x86_64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.i386", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ia64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc", "5Server:mysql-debuginfo-0:5.0.45-7.el5.ppc64", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390", "5Server:mysql-debuginfo-0:5.0.45-7.el5.s390x", "5Server:mysql-debuginfo-0:5.0.45-7.el5.x86_64", "5Server:mysql-devel-0:5.0.45-7.el5.i386", "5Server:mysql-devel-0:5.0.45-7.el5.ia64", "5Server:mysql-devel-0:5.0.45-7.el5.ppc", "5Server:mysql-devel-0:5.0.45-7.el5.ppc64", "5Server:mysql-devel-0:5.0.45-7.el5.s390", "5Server:mysql-devel-0:5.0.45-7.el5.s390x", "5Server:mysql-devel-0:5.0.45-7.el5.x86_64", "5Server:mysql-server-0:5.0.45-7.el5.i386", "5Server:mysql-server-0:5.0.45-7.el5.ia64", "5Server:mysql-server-0:5.0.45-7.el5.ppc", "5Server:mysql-server-0:5.0.45-7.el5.ppc64", "5Server:mysql-server-0:5.0.45-7.el5.s390x", "5Server:mysql-server-0:5.0.45-7.el5.x86_64", "5Server:mysql-test-0:5.0.45-7.el5.i386", "5Server:mysql-test-0:5.0.45-7.el5.ia64", "5Server:mysql-test-0:5.0.45-7.el5.ppc", "5Server:mysql-test-0:5.0.45-7.el5.s390x", "5Server:mysql-test-0:5.0.45-7.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0364" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "New release of MySQL fixes security bugs" } ] }
rhsa-2008_0768
Vulnerability from csaf_redhat
Published
2008-07-24 17:09
Modified
2024-11-22 02:43
Summary
Red Hat Security Advisory: mysql security, bug fix, and enhancement update
Notes
Topic
Updated mysql packages that fix various security issues, several bugs, and
add an enhancement are now available for Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
client/server implementation consisting of a server daemon (mysqld), and
many different client programs and libraries.
MySQL did not correctly check directories used as arguments for the DATA
DIRECTORY and INDEX DIRECTORY directives. Using this flaw, an authenticated
attacker could elevate their access privileges to tables created by other
database users. Note: this attack does not work on existing tables. An
attacker can only elevate their access to another user's tables as the
tables are created. As well, the names of these created tables need to be
predicted correctly for this attack to succeed. (CVE-2008-2079)
MySQL did not require the "DROP" privilege for "RENAME TABLE" statements.
An authenticated user could use this flaw to rename arbitrary tables.
(CVE-2007-2691)
MySQL allowed an authenticated user to access a table through a previously
created MERGE table, even after the user's privileges were revoked from the
original table, which might violate intended security policy. This is
addressed by allowing the MERGE storage engine to be disabled, which can be
done by running mysqld with the "--skip-merge" option. (CVE-2006-4031)
A flaw in MySQL allowed an authenticated user to cause the MySQL daemon to
crash via crafted SQL queries. This only caused a temporary denial of
service, as the MySQL daemon is automatically restarted after the crash.
(CVE-2006-3469)
As well, these updated packages fix the following bugs:
* in the previous mysql packages, if a column name was referenced more
than once in an "ORDER BY" section of a query, a segmentation fault
occurred.
* when MySQL failed to start, the init script returned a successful (0)
exit code. When using the Red Hat Cluster Suite, this may have caused
cluster services to report a successful start, even when MySQL failed to
start. In these updated packages, the init script returns the correct exit
codes, which resolves this issue.
* it was possible to use the mysqld_safe command to specify invalid port
numbers (higher than 65536), causing invalid ports to be created, and, in
some cases, a "port number definition: unsigned short" error. In these
updated packages, when an invalid port number is specified, the default
port number is used.
* when setting "myisam_repair_threads > 1", any repair set the index
cardinality to "1", regardless of the table size.
* the MySQL init script no longer runs "chmod -R" on the entire database
directory tree during every startup.
* when running "mysqldump" with the MySQL 4.0 compatibility mode option,
"--compatible=mysql40", mysqldump created dumps that omitted the
"auto_increment" field.
As well, the MySQL init script now uses more reliable methods for
determining parameters, such as the data directory location.
Note: these updated packages upgrade MySQL to version 4.1.22. For a full
list of bug fixes and enhancements, refer to the MySQL release notes:
http://dev.mysql.com/doc/refman/4.1/en/news-4-1-22.html
All mysql users are advised to upgrade to these updated packages, which
resolve these issues and add this enhancement.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated mysql packages that fix various security issues, several bugs, and\nadd an enhancement are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld), and\nmany different client programs and libraries.\n\nMySQL did not correctly check directories used as arguments for the DATA\nDIRECTORY and INDEX DIRECTORY directives. Using this flaw, an authenticated\nattacker could elevate their access privileges to tables created by other\ndatabase users. Note: this attack does not work on existing tables. An\nattacker can only elevate their access to another user\u0027s tables as the\ntables are created. As well, the names of these created tables need to be\npredicted correctly for this attack to succeed. (CVE-2008-2079)\n\nMySQL did not require the \"DROP\" privilege for \"RENAME TABLE\" statements.\nAn authenticated user could use this flaw to rename arbitrary tables.\n(CVE-2007-2691)\n\nMySQL allowed an authenticated user to access a table through a previously\ncreated MERGE table, even after the user\u0027s privileges were revoked from the\noriginal table, which might violate intended security policy. This is\naddressed by allowing the MERGE storage engine to be disabled, which can be\ndone by running mysqld with the \"--skip-merge\" option. (CVE-2006-4031)\n\nA flaw in MySQL allowed an authenticated user to cause the MySQL daemon to\ncrash via crafted SQL queries. This only caused a temporary denial of\nservice, as the MySQL daemon is automatically restarted after the crash.\n(CVE-2006-3469)\n\nAs well, these updated packages fix the following bugs:\n\n* in the previous mysql packages, if a column name was referenced more\nthan once in an \"ORDER BY\" section of a query, a segmentation fault\noccurred.\n\n* when MySQL failed to start, the init script returned a successful (0)\nexit code. When using the Red Hat Cluster Suite, this may have caused\ncluster services to report a successful start, even when MySQL failed to\nstart. In these updated packages, the init script returns the correct exit\ncodes, which resolves this issue.\n\n* it was possible to use the mysqld_safe command to specify invalid port\nnumbers (higher than 65536), causing invalid ports to be created, and, in\nsome cases, a \"port number definition: unsigned short\" error. In these\nupdated packages, when an invalid port number is specified, the default\nport number is used.\n\n* when setting \"myisam_repair_threads \u003e 1\", any repair set the index\ncardinality to \"1\", regardless of the table size.\n\n* the MySQL init script no longer runs \"chmod -R\" on the entire database\ndirectory tree during every startup.\n\n* when running \"mysqldump\" with the MySQL 4.0 compatibility mode option,\n\"--compatible=mysql40\", mysqldump created dumps that omitted the\n\"auto_increment\" field.\n\nAs well, the MySQL init script now uses more reliable methods for\ndetermining parameters, such as the data directory location.\n\nNote: these updated packages upgrade MySQL to version 4.1.22. For a full\nlist of bug fixes and enhancements, refer to the MySQL release notes:\nhttp://dev.mysql.com/doc/refman/4.1/en/news-4-1-22.html\n\nAll mysql users are advised to upgrade to these updated packages, which\nresolve these issues and add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0768", "url": "https://access.redhat.com/errata/RHSA-2008:0768" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "201904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=201904" }, { "category": "external", "summary": "201988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=201988" }, { "category": "external", "summary": "202246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=202246" }, { "category": "external", "summary": "221085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221085" }, { "category": "external", "summary": "233771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=233771" }, { "category": "external", "summary": "241688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241688" }, { "category": "external", "summary": "445222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=445222" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0768.json" } ], "title": "Red Hat Security Advisory: mysql security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T02:43:06+00:00", "generator": { "date": "2024-11-22T02:43:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0768", "initial_release_date": "2008-07-24T17:09:00+00:00", "revision_history": [ { "date": "2008-07-24T17:09:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-07-24T13:12:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:43:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:4.1.22-2.el4.ia64", "product": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ia64", "product_id": "mysql-debuginfo-0:4.1.22-2.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.22-2.el4?arch=ia64" } } }, { "category": "product_version", "name": "mysql-bench-0:4.1.22-2.el4.ia64", "product": { "name": "mysql-bench-0:4.1.22-2.el4.ia64", "product_id": "mysql-bench-0:4.1.22-2.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.22-2.el4?arch=ia64" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.22-2.el4.ia64", "product": { "name": "mysql-devel-0:4.1.22-2.el4.ia64", "product_id": "mysql-devel-0:4.1.22-2.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.22-2.el4?arch=ia64" } } }, { "category": "product_version", "name": "mysql-0:4.1.22-2.el4.ia64", "product": { "name": "mysql-0:4.1.22-2.el4.ia64", "product_id": "mysql-0:4.1.22-2.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.22-2.el4?arch=ia64" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.22-2.el4.ia64", "product": { "name": "mysql-server-0:4.1.22-2.el4.ia64", "product_id": "mysql-server-0:4.1.22-2.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.22-2.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:4.1.22-2.el4.i386", "product": { "name": "mysql-debuginfo-0:4.1.22-2.el4.i386", "product_id": "mysql-debuginfo-0:4.1.22-2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.22-2.el4?arch=i386" } } }, { "category": "product_version", "name": "mysql-0:4.1.22-2.el4.i386", "product": { "name": "mysql-0:4.1.22-2.el4.i386", "product_id": "mysql-0:4.1.22-2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.22-2.el4?arch=i386" } } }, { "category": "product_version", "name": "mysql-bench-0:4.1.22-2.el4.i386", "product": { "name": "mysql-bench-0:4.1.22-2.el4.i386", "product_id": "mysql-bench-0:4.1.22-2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.22-2.el4?arch=i386" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.22-2.el4.i386", "product": { "name": "mysql-devel-0:4.1.22-2.el4.i386", "product_id": "mysql-devel-0:4.1.22-2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.22-2.el4?arch=i386" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.22-2.el4.i386", "product": { "name": "mysql-server-0:4.1.22-2.el4.i386", "product_id": "mysql-server-0:4.1.22-2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.22-2.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:4.1.22-2.el4.x86_64", "product": { "name": "mysql-debuginfo-0:4.1.22-2.el4.x86_64", "product_id": "mysql-debuginfo-0:4.1.22-2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.22-2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-bench-0:4.1.22-2.el4.x86_64", "product": { "name": "mysql-bench-0:4.1.22-2.el4.x86_64", "product_id": "mysql-bench-0:4.1.22-2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.22-2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.22-2.el4.x86_64", "product": { "name": "mysql-devel-0:4.1.22-2.el4.x86_64", "product_id": "mysql-devel-0:4.1.22-2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.22-2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-0:4.1.22-2.el4.x86_64", "product": { "name": "mysql-0:4.1.22-2.el4.x86_64", "product_id": "mysql-0:4.1.22-2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.22-2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.22-2.el4.x86_64", "product": { "name": "mysql-server-0:4.1.22-2.el4.x86_64", "product_id": "mysql-server-0:4.1.22-2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.22-2.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mysql-0:4.1.22-2.el4.src", "product": { "name": "mysql-0:4.1.22-2.el4.src", "product_id": "mysql-0:4.1.22-2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.22-2.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc64", "product": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc64", "product_id": "mysql-debuginfo-0:4.1.22-2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.22-2.el4?arch=ppc64" } } }, { "category": "product_version", "name": "mysql-0:4.1.22-2.el4.ppc64", "product": { "name": "mysql-0:4.1.22-2.el4.ppc64", "product_id": "mysql-0:4.1.22-2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.22-2.el4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc", "product": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc", "product_id": "mysql-debuginfo-0:4.1.22-2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.22-2.el4?arch=ppc" } } }, { "category": "product_version", "name": "mysql-bench-0:4.1.22-2.el4.ppc", "product": { "name": "mysql-bench-0:4.1.22-2.el4.ppc", "product_id": "mysql-bench-0:4.1.22-2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.22-2.el4?arch=ppc" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.22-2.el4.ppc", "product": { "name": "mysql-devel-0:4.1.22-2.el4.ppc", "product_id": "mysql-devel-0:4.1.22-2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.22-2.el4?arch=ppc" } } }, { "category": "product_version", "name": "mysql-0:4.1.22-2.el4.ppc", "product": { "name": "mysql-0:4.1.22-2.el4.ppc", "product_id": "mysql-0:4.1.22-2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.22-2.el4?arch=ppc" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.22-2.el4.ppc", "product": { "name": "mysql-server-0:4.1.22-2.el4.ppc", "product_id": "mysql-server-0:4.1.22-2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.22-2.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:4.1.22-2.el4.s390x", "product": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390x", "product_id": "mysql-debuginfo-0:4.1.22-2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.22-2.el4?arch=s390x" } } }, { "category": "product_version", "name": "mysql-bench-0:4.1.22-2.el4.s390x", "product": { "name": "mysql-bench-0:4.1.22-2.el4.s390x", "product_id": "mysql-bench-0:4.1.22-2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.22-2.el4?arch=s390x" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.22-2.el4.s390x", "product": { "name": "mysql-devel-0:4.1.22-2.el4.s390x", "product_id": "mysql-devel-0:4.1.22-2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.22-2.el4?arch=s390x" } } }, { "category": "product_version", "name": "mysql-0:4.1.22-2.el4.s390x", "product": { "name": "mysql-0:4.1.22-2.el4.s390x", "product_id": "mysql-0:4.1.22-2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.22-2.el4?arch=s390x" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.22-2.el4.s390x", "product": { "name": "mysql-server-0:4.1.22-2.el4.s390x", "product_id": "mysql-server-0:4.1.22-2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.22-2.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:4.1.22-2.el4.s390", "product": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390", "product_id": "mysql-debuginfo-0:4.1.22-2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.22-2.el4?arch=s390" } } }, { "category": "product_version", "name": "mysql-0:4.1.22-2.el4.s390", "product": { "name": "mysql-0:4.1.22-2.el4.s390", "product_id": "mysql-0:4.1.22-2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.22-2.el4?arch=s390" } } }, { "category": "product_version", "name": "mysql-bench-0:4.1.22-2.el4.s390", "product": { "name": "mysql-bench-0:4.1.22-2.el4.s390", "product_id": "mysql-bench-0:4.1.22-2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.22-2.el4?arch=s390" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.22-2.el4.s390", "product": { "name": "mysql-devel-0:4.1.22-2.el4.s390", "product_id": "mysql-devel-0:4.1.22-2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.22-2.el4?arch=s390" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.22-2.el4.s390", "product": { "name": "mysql-server-0:4.1.22-2.el4.s390", "product_id": "mysql-server-0:4.1.22-2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.22-2.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.22-2.el4.ppc64" }, "product_reference": "mysql-0:4.1.22-2.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.22-2.el4.src" }, "product_reference": "mysql-0:4.1.22-2.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-server-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-server-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-server-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-server-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-server-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-server-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.22-2.el4.ppc64" }, "product_reference": "mysql-0:4.1.22-2.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.22-2.el4.src" }, "product_reference": "mysql-0:4.1.22-2.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-server-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-server-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-server-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-server-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-server-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-server-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.22-2.el4.ppc64" }, "product_reference": "mysql-0:4.1.22-2.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.22-2.el4.src" }, "product_reference": "mysql-0:4.1.22-2.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-server-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-server-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-server-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-server-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-server-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-server-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.22-2.el4.ppc64" }, "product_reference": "mysql-0:4.1.22-2.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.22-2.el4.src" }, "product_reference": "mysql-0:4.1.22-2.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-bench-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-debuginfo-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-devel-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.22-2.el4.i386" }, "product_reference": "mysql-server-0:4.1.22-2.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.22-2.el4.ia64" }, "product_reference": "mysql-server-0:4.1.22-2.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.22-2.el4.ppc" }, "product_reference": "mysql-server-0:4.1.22-2.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.22-2.el4.s390" }, "product_reference": "mysql-server-0:4.1.22-2.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.22-2.el4.s390x" }, "product_reference": "mysql-server-0:4.1.22-2.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.22-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.22-2.el4.x86_64" }, "product_reference": "mysql-server-0:4.1.22-2.el4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-3469", "discovery_date": "2006-07-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "201904" } ], "notes": [ { "category": "description", "text": "Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql server DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1, 3, or 5, and Red Hat Application Stack v1 and v2.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3469" }, { "category": "external", "summary": "RHBZ#201904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=201904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3469", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3469" } ], "release_date": "2006-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-24T17:09:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0768" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql server DoS" }, { "cve": "CVE-2006-4031", "discovery_date": "2006-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "202246" } ], "notes": [ { "category": "description", "text": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "MySQL improper permission revocation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4031" }, { "category": "external", "summary": "RHBZ#202246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=202246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4031", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031" } ], "release_date": "2005-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-24T17:09:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0768" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "MySQL improper permission revocation" }, { "cve": "CVE-2007-2691", "discovery_date": "2007-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "241688" } ], "notes": [ { "category": "description", "text": "MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql DROP privilege not enforced when renaming tables", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2691" }, { "category": "external", "summary": "RHBZ#241688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2691", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2691" } ], "release_date": "2007-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-24T17:09:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0768" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql DROP privilege not enforced when renaming tables" }, { "cve": "CVE-2008-2079", "discovery_date": "2008-05-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "445222" } ], "notes": [ { "category": "description", "text": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql: privilege escalation via DATA/INDEX DIRECTORY directives", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect MySQL as supplied with Red Hat Enterprise Linux 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2079" }, { "category": "external", "summary": "RHBZ#445222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=445222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2079", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2079" } ], "release_date": "2008-03-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-24T17:09:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0768" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS:mysql-0:4.1.22-2.el4.i386", "4AS:mysql-0:4.1.22-2.el4.ia64", "4AS:mysql-0:4.1.22-2.el4.ppc", "4AS:mysql-0:4.1.22-2.el4.ppc64", "4AS:mysql-0:4.1.22-2.el4.s390", "4AS:mysql-0:4.1.22-2.el4.s390x", "4AS:mysql-0:4.1.22-2.el4.src", "4AS:mysql-0:4.1.22-2.el4.x86_64", "4AS:mysql-bench-0:4.1.22-2.el4.i386", "4AS:mysql-bench-0:4.1.22-2.el4.ia64", "4AS:mysql-bench-0:4.1.22-2.el4.ppc", "4AS:mysql-bench-0:4.1.22-2.el4.s390", "4AS:mysql-bench-0:4.1.22-2.el4.s390x", "4AS:mysql-bench-0:4.1.22-2.el4.x86_64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4AS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4AS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4AS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4AS:mysql-devel-0:4.1.22-2.el4.i386", "4AS:mysql-devel-0:4.1.22-2.el4.ia64", "4AS:mysql-devel-0:4.1.22-2.el4.ppc", "4AS:mysql-devel-0:4.1.22-2.el4.s390", "4AS:mysql-devel-0:4.1.22-2.el4.s390x", "4AS:mysql-devel-0:4.1.22-2.el4.x86_64", "4AS:mysql-server-0:4.1.22-2.el4.i386", "4AS:mysql-server-0:4.1.22-2.el4.ia64", "4AS:mysql-server-0:4.1.22-2.el4.ppc", "4AS:mysql-server-0:4.1.22-2.el4.s390", "4AS:mysql-server-0:4.1.22-2.el4.s390x", "4AS:mysql-server-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-0:4.1.22-2.el4.i386", "4Desktop:mysql-0:4.1.22-2.el4.ia64", "4Desktop:mysql-0:4.1.22-2.el4.ppc", "4Desktop:mysql-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-0:4.1.22-2.el4.s390", "4Desktop:mysql-0:4.1.22-2.el4.s390x", "4Desktop:mysql-0:4.1.22-2.el4.src", "4Desktop:mysql-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-bench-0:4.1.22-2.el4.i386", "4Desktop:mysql-bench-0:4.1.22-2.el4.ia64", "4Desktop:mysql-bench-0:4.1.22-2.el4.ppc", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390", "4Desktop:mysql-bench-0:4.1.22-2.el4.s390x", "4Desktop:mysql-bench-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.i386", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4Desktop:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-devel-0:4.1.22-2.el4.i386", "4Desktop:mysql-devel-0:4.1.22-2.el4.ia64", "4Desktop:mysql-devel-0:4.1.22-2.el4.ppc", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390", "4Desktop:mysql-devel-0:4.1.22-2.el4.s390x", "4Desktop:mysql-devel-0:4.1.22-2.el4.x86_64", "4Desktop:mysql-server-0:4.1.22-2.el4.i386", "4Desktop:mysql-server-0:4.1.22-2.el4.ia64", "4Desktop:mysql-server-0:4.1.22-2.el4.ppc", "4Desktop:mysql-server-0:4.1.22-2.el4.s390", "4Desktop:mysql-server-0:4.1.22-2.el4.s390x", "4Desktop:mysql-server-0:4.1.22-2.el4.x86_64", "4ES:mysql-0:4.1.22-2.el4.i386", "4ES:mysql-0:4.1.22-2.el4.ia64", "4ES:mysql-0:4.1.22-2.el4.ppc", "4ES:mysql-0:4.1.22-2.el4.ppc64", "4ES:mysql-0:4.1.22-2.el4.s390", "4ES:mysql-0:4.1.22-2.el4.s390x", "4ES:mysql-0:4.1.22-2.el4.src", "4ES:mysql-0:4.1.22-2.el4.x86_64", "4ES:mysql-bench-0:4.1.22-2.el4.i386", "4ES:mysql-bench-0:4.1.22-2.el4.ia64", "4ES:mysql-bench-0:4.1.22-2.el4.ppc", "4ES:mysql-bench-0:4.1.22-2.el4.s390", "4ES:mysql-bench-0:4.1.22-2.el4.s390x", "4ES:mysql-bench-0:4.1.22-2.el4.x86_64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.i386", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4ES:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390", "4ES:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4ES:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4ES:mysql-devel-0:4.1.22-2.el4.i386", "4ES:mysql-devel-0:4.1.22-2.el4.ia64", "4ES:mysql-devel-0:4.1.22-2.el4.ppc", "4ES:mysql-devel-0:4.1.22-2.el4.s390", "4ES:mysql-devel-0:4.1.22-2.el4.s390x", "4ES:mysql-devel-0:4.1.22-2.el4.x86_64", "4ES:mysql-server-0:4.1.22-2.el4.i386", "4ES:mysql-server-0:4.1.22-2.el4.ia64", "4ES:mysql-server-0:4.1.22-2.el4.ppc", "4ES:mysql-server-0:4.1.22-2.el4.s390", "4ES:mysql-server-0:4.1.22-2.el4.s390x", "4ES:mysql-server-0:4.1.22-2.el4.x86_64", "4WS:mysql-0:4.1.22-2.el4.i386", "4WS:mysql-0:4.1.22-2.el4.ia64", "4WS:mysql-0:4.1.22-2.el4.ppc", "4WS:mysql-0:4.1.22-2.el4.ppc64", "4WS:mysql-0:4.1.22-2.el4.s390", "4WS:mysql-0:4.1.22-2.el4.s390x", "4WS:mysql-0:4.1.22-2.el4.src", "4WS:mysql-0:4.1.22-2.el4.x86_64", "4WS:mysql-bench-0:4.1.22-2.el4.i386", "4WS:mysql-bench-0:4.1.22-2.el4.ia64", "4WS:mysql-bench-0:4.1.22-2.el4.ppc", "4WS:mysql-bench-0:4.1.22-2.el4.s390", "4WS:mysql-bench-0:4.1.22-2.el4.s390x", "4WS:mysql-bench-0:4.1.22-2.el4.x86_64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.i386", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ia64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc", "4WS:mysql-debuginfo-0:4.1.22-2.el4.ppc64", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390", "4WS:mysql-debuginfo-0:4.1.22-2.el4.s390x", "4WS:mysql-debuginfo-0:4.1.22-2.el4.x86_64", "4WS:mysql-devel-0:4.1.22-2.el4.i386", "4WS:mysql-devel-0:4.1.22-2.el4.ia64", "4WS:mysql-devel-0:4.1.22-2.el4.ppc", "4WS:mysql-devel-0:4.1.22-2.el4.s390", "4WS:mysql-devel-0:4.1.22-2.el4.s390x", "4WS:mysql-devel-0:4.1.22-2.el4.x86_64", "4WS:mysql-server-0:4.1.22-2.el4.i386", "4WS:mysql-server-0:4.1.22-2.el4.ia64", "4WS:mysql-server-0:4.1.22-2.el4.ppc", "4WS:mysql-server-0:4.1.22-2.el4.s390", "4WS:mysql-server-0:4.1.22-2.el4.s390x", "4WS:mysql-server-0:4.1.22-2.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mysql: privilege escalation via DATA/INDEX DIRECTORY directives" } ] }
ghsa-qqjv-c795-8pr6
Vulnerability from github
Published
2022-05-01 07:14
Modified
2022-05-01 07:14
Details
MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
{ "affected": [], "aliases": [ "CVE-2006-4031" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-08-09T22:04:00Z", "severity": "LOW" }, "details": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.", "id": "GHSA-qqjv-c795-8pr6", "modified": "2022-05-01T07:14:45Z", "published": "2022-05-01T07:14:45Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-568" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "type": "WEB", "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "type": "WEB", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "type": "WEB", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/21259" }, { "type": "WEB", "url": "http://secunia.com/advisories/21382" }, { "type": "WEB", "url": "http://secunia.com/advisories/21627" }, { "type": "WEB", "url": "http://secunia.com/advisories/21685" }, { "type": "WEB", "url": "http://secunia.com/advisories/21770" }, { "type": "WEB", "url": "http://secunia.com/advisories/22080" }, { "type": "WEB", "url": "http://secunia.com/advisories/24479" }, { "type": "WEB", "url": "http://secunia.com/advisories/30351" }, { "type": "WEB", "url": "http://secunia.com/advisories/31226" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016617" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19279" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0930" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2006-4031
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2006-4031", "description": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.", "id": "GSD-2006-4031", "references": [ "https://www.suse.com/security/cve/CVE-2006-4031.html", "https://access.redhat.com/errata/RHSA-2008:0768", "https://access.redhat.com/errata/RHSA-2008:0364", "https://access.redhat.com/errata/RHSA-2007:0083", "https://linux.oracle.com/cve/CVE-2006-4031.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-4031" ], "details": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.", "id": "GSD-2006-4031", "modified": "2023-12-13T01:19:51.805724Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21259", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21259" }, { "name": "21627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21627" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "SUSE-SR:2006:023", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "ADV-2006-3079", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "name": "19279", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19279" }, { "name": "USN-338-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "31226", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31226" }, { "name": "oval:org.mitre.oval:def:10468", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "21382", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21382" }, { "name": "MDKSA-2006:149", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22080" }, { "name": "21770", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21770" }, { "name": "21685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21685" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "1016617", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016617" }, { "name": "http://bugs.mysql.com/bug.php?id=15195", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "name": "30351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30351" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "https://issues.rpath.com/browse/RPL-568", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-568" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4031" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.mysql.com/bug.php?id=15195", "refsource": "MISC", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "name": "19279", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19279" }, { "name": "1016617", "refsource": "SECTRACK", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016617" }, { "name": "21259", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21259" }, { "name": "21382", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21382" }, { "name": "https://issues.rpath.com/browse/RPL-568", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-568" }, { "name": "USN-338-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "21685", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21685" }, { "name": "21770", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21770" }, { "name": "21627", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21627" }, { "name": "SUSE-SR:2006:023", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "22080", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22080" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "24479", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24479" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "MDKSA-2006:149", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "TA07-072A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "31226", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/31226" }, { "name": "RHSA-2008:0768", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "30351", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30351" }, { "name": "ADV-2006-3079", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "oval:org.mitre.oval:def:10468", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2019-12-17T20:16Z", "publishedDate": "2006-08-09T22:04Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.