---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Mandriva update for mysql SECUNIA ADVISORY ID: SA25946 VERIFY ADVISORY: http://secunia.com/advisories/25946/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for mysql. This fixes some vulnerabilities and a security issue, which can be exploited by malicious users to cause a DoS (Denial of Service) or gain escalated privileges. For more information: SA24483 SA25188 SA25301 SOLUTION: Apply updated packages. Mandriva Linux 2007 21bf6c3cf8908d8ec01317dbbaeda4d4 2007.0/i586/MySQL-5.0.24a-2.1mdv2007.0.i586.rpm af81d1d15cceb0906b17ed905c8027c6 2007.0/i586/MySQL-Max-5.0.24a-2.1mdv2007.0.i586.rpm a90669dfc21494a4453bc31620513b82 2007.0/i586/MySQL-bench-5.0.24a-2.1mdv2007.0.i586.rpm bd4a71a850f5df9c7583d7eff0fa2a88 2007.0/i586/MySQL-client-5.0.24a-2.1mdv2007.0.i586.rpm 6cbd4325f98ba34c3c0c07da93edf9f7 2007.0/i586/MySQL-common-5.0.24a-2.1mdv2007.0.i586.rpm a7eef0dd7b38e3a704b49d57d9cae953 2007.0/i586/MySQL-ndb-extra-5.0.24a-2.1mdv2007.0.i586.rpm 1165add80c08fdbe13c9d0906340a998 2007.0/i586/MySQL-ndb-management-5.0.24a-2.1mdv2007.0.i586.rpm 1dab5164b03c4689a9289e5b8e4c1b83 2007.0/i586/MySQL-ndb-storage-5.0.24a-2.1mdv2007.0.i586.rpm cfc946c33e31cad4eb3d2cee60101af8 2007.0/i586/MySQL-ndb-tools-5.0.24a-2.1mdv2007.0.i586.rpm 25fa8c6756256c4dd67ece5a36651394 2007.0/i586/libmysql15-5.0.24a-2.1mdv2007.0.i586.rpm a36d220223051510d41b4f9a4505cc21 2007.0/i586/libmysql15-devel-5.0.24a-2.1mdv2007.0.i586.rpm 6257cf37dd793e4e28079e24d85371cf 2007.0/i586/libmysql15-static-devel-5.0.24a-2.1mdv2007.0.i586.rpm 61fd5383c89b7599741d3627c6a568f2 2007.0/SRPMS/MySQL-5.0.24a-2.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 3cc829514ba910e9d3118874a3390e51 2007.0/x86_64/MySQL-5.0.24a-2.1mdv2007.0.x86_64.rpm 6f84bac1c088b0ef773dcdc051de08e5 2007.0/x86_64/MySQL-Max-5.0.24a-2.1mdv2007.0.x86_64.rpm 84e4c7c9cbd439444bfb3353994e8d23 2007.0/x86_64/MySQL-bench-5.0.24a-2.1mdv2007.0.x86_64.rpm 96ac718984a765f95002a0ee934e93cd 2007.0/x86_64/MySQL-client-5.0.24a-2.1mdv2007.0.x86_64.rpm 1bed2bc4d5c4f5700b13495d8bb6f3c4 2007.0/x86_64/MySQL-common-5.0.24a-2.1mdv2007.0.x86_64.rpm 55ea8d680cfdeaf48eeacf3aa789ab19 2007.0/x86_64/MySQL-ndb-extra-5.0.24a-2.1mdv2007.0.x86_64.rpm 4047515dedd71ffe9c6fd4268e25f115 2007.0/x86_64/MySQL-ndb-management-5.0.24a-2.1mdv2007.0.x86_64.rpm 05c75e22bf10cff94581eaa3096c2e47 2007.0/x86_64/MySQL-ndb-storage-5.0.24a-2.1mdv2007.0.x86_64.rpm c105dd5a6a0c96ad00795183ed9f6ae8 2007.0/x86_64/MySQL-ndb-tools-5.0.24a-2.1mdv2007.0.x86_64.rpm 41c0722f531c0af55c3b2d621c29f009 2007.0/x86_64/lib64mysql15-5.0.24a-2.1mdv2007.0.x86_64.rpm 58801989259c4983f0201bab1bdb4d0e 2007.0/x86_64/lib64mysql15-devel-5.0.24a-2.1mdv2007.0.x86_64.rpm dc9cbf9b7edc50053dbad01c988667c1 2007.0/x86_64/lib64mysql15-static-devel-5.0.24a-2.1mdv2007.0.x86_64.rpm 61fd5383c89b7599741d3627c6a568f2 2007.0/SRPMS/MySQL-5.0.24a-2.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2007:139 OTHER REFERENCES: SA24483: http://secunia.com/advisories/24483/ SA25188: http://secunia.com/advisories/25188/ SA25301: http://secunia.com/advisories/25301/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------