---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Fedora update for mysql SECUNIA ADVISORY ID: SA28025 VERIFY ADVISORY: http://secunia.com/advisories/28025/ CRITICAL: Less critical IMPACT: Manipulation of data, Privilege escalation, DoS WHERE: >From remote OPERATING SYSTEM: Fedora 8 http://secunia.com/product/16769/ Fedora 7 http://secunia.com/product/15552/ DESCRIPTION: Fedora has issued an update for mysql. This fixes two vulnerabilities and a security issue, which can be exploited by malicious users to gain escalated privileges, manipulate certain data, or to cause a DoS (Denial of Service). For more information: SA27568 SA28063 SOLUTION: Apply updated packages. -- Fedora 7 -- 5bafdd41779c3704bfb8dc2a38127e2636e9a5a2 mysql-debuginfo-5.0.45-6.fc7.ppc64.rpm 39c1a635ff9735a846017953983b9b71454ba6f4 mysql-5.0.45-6.fc7.ppc64.rpm 31f255d994dd4032f3e37258df51a2646877ab05 mysql-devel-5.0.45-6.fc7.ppc64.rpm fc5dcd750d01eda91821e045fd4d80428ec1c9f9 mysql-libs-5.0.45-6.fc7.ppc64.rpm b3d8bb885e1ced4edea1bc9397900d571426e654 mysql-server-5.0.45-6.fc7.ppc64.rpm c7983caf53ee0bb25c0780987b0ed0e6abb07d40 mysql-bench-5.0.45-6.fc7.ppc64.rpm ce59068c37f64cf885693ab5e2138cb7329549f2 mysql-test-5.0.45-6.fc7.ppc64.rpm 14e28b71fc27df87ed3253525b536c98d9a70f6a mysql-bench-5.0.45-6.fc7.i386.rpm f5ab997c95cfce27c00f92218afc9b799d89e970 mysql-server-5.0.45-6.fc7.i386.rpm 4caa004094aebe759d0df29bafc8d92011aff659 mysql-devel-5.0.45-6.fc7.i386.rpm f7f9ebf817ec5f0f340f8275de330b9b5bf9c3ed mysql-test-5.0.45-6.fc7.i386.rpm c51cbdc0a7bebd5d97969a8782f639f86eb7d79b mysql-5.0.45-6.fc7.i386.rpm 985322a6c860d9be3a478ddbc6fa13096b550edc mysql-libs-5.0.45-6.fc7.i386.rpm 539ff7ab9039ea1277d52fa2121981e86e52d8ce mysql-debuginfo-5.0.45-6.fc7.i386.rpm a4d68745280d09fca6080fca7d5da7102fd38716 mysql-test-5.0.45-6.fc7.x86_64.rpm d290635bba49a9b40ecb10c2cc680b0920e32dfd mysql-libs-5.0.45-6.fc7.x86_64.rpm 15939758ab3248e9ee2859aa2af6cdf00d1225c4 mysql-bench-5.0.45-6.fc7.x86_64.rpm 029a9a33696304295d282ede223690fcc1c3aa54 mysql-debuginfo-5.0.45-6.fc7.x86_64.rpm 507b1ace20acd7cb4a064268eeab3b8264b57371 mysql-5.0.45-6.fc7.x86_64.rpm d8ce275d5761f55250091e8ac0ed6e87c9564641 mysql-server-5.0.45-6.fc7.x86_64.rpm d07f4a927129cc80a4280f20c7c753788c76c342 mysql-devel-5.0.45-6.fc7.x86_64.rpm f5faf708040e8316c278d132fa7c031fa63ebd70 mysql-bench-5.0.45-6.fc7.ppc.rpm 492a6abb709a24733a2ee1d6ccdc33ce6f82e17b mysql-5.0.45-6.fc7.ppc.rpm 9852aee5cea0cf27e78fd99390ef2b28aa205fe3 mysql-test-5.0.45-6.fc7.ppc.rpm feeebfa29bd89b63f93e00de46c249bf7cd315e2 mysql-server-5.0.45-6.fc7.ppc.rpm 40d5554a22160704f3e8d5d9700529961bb28f89 mysql-libs-5.0.45-6.fc7.ppc.rpm 301a62796eab49ea48059a2eb50691ae7f82ea5d mysql-debuginfo-5.0.45-6.fc7.ppc.rpm 89387bc35b740f9950304ff22799bc37ecf05268 mysql-devel-5.0.45-6.fc7.ppc.rpm ffddf6c702afdab99e8545c3cdc929c22934b250 mysql-5.0.45-6.fc7.src.rpm -- Fedora 8 -- 09171989518bf3ac3dc9a6361664e519aa4dc448 mysql-debuginfo-5.0.45-6.fc8.ppc64.rpm 248904c75ec26a58e88c960d656f7bb7c3ac53dc mysql-devel-5.0.45-6.fc8.ppc64.rpm 58d242c12ebc54bda9542f4e5ec0385c5e992b3f mysql-5.0.45-6.fc8.ppc64.rpm 5777599d26946e8ebf4af805f09f1108192c156d mysql-libs-5.0.45-6.fc8.ppc64.rpm 4261099b6c667eb58eac372343b3da35d72a7195 mysql-bench-5.0.45-6.fc8.ppc64.rpm 5f5ba841bedee195911ed3a33f6d52befa64e566 mysql-server-5.0.45-6.fc8.ppc64.rpm f139c0ede31b5366b8f01908971431c095d37252 mysql-test-5.0.45-6.fc8.ppc64.rpm 8f46783702a2415d5b44043230ab1e51c2c5c110 mysql-devel-5.0.45-6.fc8.i386.rpm 04f172014f81b93e3c2e7e4663cbd6a9d53284e2 mysql-bench-5.0.45-6.fc8.i386.rpm 5cebccfc6d0e1c007793c48bd68bfc014f0ed557 mysql-debuginfo-5.0.45-6.fc8.i386.rpm d9c6844dca932474a08dd5ac47039241ab2cc350 mysql-server-5.0.45-6.fc8.i386.rpm 4c27166f0a342bbc5e741fdcbdd4e9105b5c458a mysql-test-5.0.45-6.fc8.i386.rpm e0dc812842e175ad4c3e5f90142b655fd8fbcc8b mysql-5.0.45-6.fc8.i386.rpm 102a0435bd812f99b2aaab2541ac5c3d40312dbb mysql-libs-5.0.45-6.fc8.i386.rpm 2181b36ae29c240ab89c686e51a8d1fad9dc40bf mysql-test-5.0.45-6.fc8.x86_64.rpm 7aea8e82a1abd1e47f938f979b5c761d6a3d926e mysql-debuginfo-5.0.45-6.fc8.x86_64.rpm 0c7feaeec5ade79465690fe3c6b617ee3a84878c mysql-server-5.0.45-6.fc8.x86_64.rpm bdd1573cf82905bf9d43623feb34cc2baef30a8f mysql-devel-5.0.45-6.fc8.x86_64.rpm 1052a6ff3b67a807906a2150296a44d0321ad46b mysql-5.0.45-6.fc8.x86_64.rpm fe8e6653351cc9be53c72fdf3cc423734771d1b1 mysql-libs-5.0.45-6.fc8.x86_64.rpm e251bf0e3453040d4fc24c45d57002ff96b8913d mysql-bench-5.0.45-6.fc8.x86_64.rpm 64252f560e2297c7adaad31c657ffbfe6bb5e312 mysql-5.0.45-6.fc8.ppc.rpm 036f7543a23cd9e8f4b6010a442b1a30ed8d0b44 mysql-libs-5.0.45-6.fc8.ppc.rpm 3cd97de4076b7371285cfdc72d15a0fce3212668 mysql-devel-5.0.45-6.fc8.ppc.rpm 2238e317cc5f8b1f8d28f8f1f8a5216ba7934181 mysql-debuginfo-5.0.45-6.fc8.ppc.rpm 80859a51cf02ba6fb0b590d1913083a77d28f31f mysql-bench-5.0.45-6.fc8.ppc.rpm e3d56220afcd784abebe7695962b7ac90957f5e9 mysql-test-5.0.45-6.fc8.ppc.rpm b843eac44ec9cfaddca8dec857955f22183232bf mysql-server-5.0.45-6.fc8.ppc.rpm c795ab0cb3f0ded7fa0ad2ff2a084ab61a385cce mysql-5.0.45-6.fc8.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html OTHER REFERENCES: SA27568: http://secunia.com/advisories/27568/ SA28063: http://secunia.com/advisories/28063/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------