---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for mysql-dfsg-4.1 SECUNIA ADVISORY ID: SA21762 VERIFY ADVISORY: http://secunia.com/advisories/21762/ CRITICAL: Not critical IMPACT: Security Bypass, DoS WHERE: >From local network OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ DESCRIPTION: Debian has issued an update for mysql-dfsg-4.1. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions or to cause a DoS (Denial of Service). For more information: SA16170 SA21506 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge7.dsc Size/MD5 checksum: 1029 f78ce0ba986d5447bb8f97615a256d34 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge7.diff.gz Size/MD5 checksum: 171446 886a2834418b0dbf73f0a24601d6614b http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a.orig.tar.gz Size/MD5 checksum: 15771855 3c0582606a8903e758c2014c2481c7c3 Architecture independent components: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.11a-4sarge7_all.deb Size/MD5 checksum: 36734 693a8ef06aa29be6cad675de2a6a7f58 Alpha architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_alpha.deb Size/MD5 checksum: 1591008 095cb0959a26aa12ba1098ec1527f2f6 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_alpha.deb Size/MD5 checksum: 7965692 2b360e6ce8675de52bf8ac0388b67e88 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_alpha.deb Size/MD5 checksum: 1001216 935a4004111792c92283169faaf27a2b http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_alpha.deb Size/MD5 checksum: 17487402 37fd9a23880da7f6c9d01f582de30b2a AMD64 architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_amd64.deb Size/MD5 checksum: 1452264 613001b313f49f98b3642fdbb1cefd47 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_amd64.deb Size/MD5 checksum: 5552006 e07c66d2d0775fabe1873b63326f91ce http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_amd64.deb Size/MD5 checksum: 849788 d2ac22320d4990db02c7ef669801f8a9 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_amd64.deb Size/MD5 checksum: 14711714 ff7e791223a16ea3db62bebb61199991 ARM architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_arm.deb Size/MD5 checksum: 1389010 e78ef65cabee94c4bb980ddba4858101 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_arm.deb Size/MD5 checksum: 5559036 05d9e88ab7b202066bde6412faa5610e http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_arm.deb Size/MD5 checksum: 837066 2ce1305c8ec4cc9f13180b9643060b5e http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_arm.deb Size/MD5 checksum: 14558032 394408c010fecbd7dd56c189a707c9dc HP Precision architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_hppa.deb Size/MD5 checksum: 1551436 2140033cb49600177d143589a4d5f5e5 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_hppa.deb Size/MD5 checksum: 6250450 2ac95caa193ffe8da3ee5a1f3666a6e9 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_hppa.deb Size/MD5 checksum: 910286 4ea3496ccfcaf43267ac696d82a5b241 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_hppa.deb Size/MD5 checksum: 15791676 0100c389eed339cc92adf996903d325e Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_i386.deb Size/MD5 checksum: 1418264 58cb49aa03d8635c6d89fc7a7a4bfeed http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_i386.deb Size/MD5 checksum: 5644334 4d28d754a1b1806a9c884d50507e9bbe http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_i386.deb Size/MD5 checksum: 830950 7591a44d9a2a5113d81724af061553c7 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_i386.deb Size/MD5 checksum: 14558420 5118b4d564821315737f5c36cd76da2a Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_ia64.deb Size/MD5 checksum: 1713606 6947d7391e6eda458e11af75136facec http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_ia64.deb Size/MD5 checksum: 7782698 617e920c805eb801485d9407abea748c http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_ia64.deb Size/MD5 checksum: 1050822 036df024dd1fc33786cc39665e874ca8 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_ia64.deb Size/MD5 checksum: 18476104 1ad4add7db75445e9ba57b5675df117a Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_m68k.deb Size/MD5 checksum: 1398210 dc9e4c11345095e4fb8d09633e2d3cc1 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_m68k.deb Size/MD5 checksum: 5284390 58ceec50857da346c543371d1a7c2cb1 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_m68k.deb Size/MD5 checksum: 804080 e8901755fad09fbacff320e695640998 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_m68k.deb Size/MD5 checksum: 14072066 3f2688ab0826890c0ce7c96010059d9d Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_mips.deb Size/MD5 checksum: 1479186 0ee29d53649f758a92cd30d34c76ee44 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_mips.deb Size/MD5 checksum: 6053370 325e30177b30512ddfc21b3a29c9ef35 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_mips.deb Size/MD5 checksum: 904744 822028a9dc30c8184fb39e7d3702b584 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_mips.deb Size/MD5 checksum: 15410530 2350cc94b072a7370335920f2b71c00c Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_mipsel.deb Size/MD5 checksum: 1446606 bddf2675d1c6d4612124add24decfb04 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_mipsel.deb Size/MD5 checksum: 5971626 0a9612cf1b841d18528494266e456466 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_mipsel.deb Size/MD5 checksum: 890406 ce87ddbff8e3ccf21ee50b1f1b5ea6af http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_mipsel.deb Size/MD5 checksum: 15105788 e55f9025ab01276e6b56674d3788fc21 PowerPC architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_powerpc.deb Size/MD5 checksum: 1477098 e6e5c35fd56e9c8fb300dbc2c27ce367 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_powerpc.deb Size/MD5 checksum: 6027864 c60d3023d5a353b6f65bd1e0b9eb3acc http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_powerpc.deb Size/MD5 checksum: 907698 197e9976c06dcf131d5ce4a84782ff18 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_powerpc.deb Size/MD5 checksum: 15403250 7294d99a4b1184c27943064d7ea8a2a3 IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_s390.deb Size/MD5 checksum: 1538810 7c0ef4dd57c055eb2776e479ccccc30d http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_s390.deb Size/MD5 checksum: 5461924 44b8f22c760e7897986d1ad51a1f43fd http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_s390.deb Size/MD5 checksum: 884554 7a677766c77b2853e5b9732a1c13abc4 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_s390.deb Size/MD5 checksum: 15055448 8577cf00fc82d39b576a6d5f03c9ed10 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge7_sparc.deb Size/MD5 checksum: 1460740 6b26255d617fef7d78f32ace3d2820ef http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge7_sparc.deb Size/MD5 checksum: 6208326 e609ca26560489ded95cc1099b76a04c http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge7_sparc.deb Size/MD5 checksum: 868486 a44ad9b7c9ded79533b610bd0ac36672 http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge7_sparc.deb Size/MD5 checksum: 15392204 2d2de1308dc7ef64dfbf8f47ffe1d2e9 -- Debian GNU/Linux unstable alias sid -- Fixed in version 5.0.24-3. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1169 OTHER REFERENCES: SA16170: http://secunia.com/advisories/16170/ SA21506: http://secunia.com/advisories/21506 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------