Bug 1274764 (CVE-2015-4819)

Summary: CVE-2015-4819 mysql: unspecified vulnerability related to Client programs (CPU October 2015)
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: abaron, apevec, ayoung, chrisw, cvsbot-xmlrpc, dallan, databases-maint, dciabrin, gkotton, hhorak, jjoyce, jorton, jschluet, jstanek, kbasil, lhh, lpeer, markmc, mbayer, mmaslano, mmuzila, rbryant, sclewis, srevivo, tdecacqu
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mysql 5.5.45, mysql 5.6.26, mariadb 5.5.45, mariadb 10.1.8, mariadb 10.0.21 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:44:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1276223, 1276224, 1276225, 1304515, 1304516, 1330444, 1330445, 1342454    
Bug Blocks: 1274745    
Attachments:
Description Flags
Relevant parts diff between mysql-5.5.45 and mysql-5.5.44 none

Description Martin Prpič 2015-10-23 13:50:18 UTC
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.44 and earlier and 5.6.25 and earlier. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.

External References:

http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixMSQL

Comment 1 Huzaifa S. Sidhpurwala 2015-10-29 06:15:44 UTC
This issue was addressed in mariadb-10.0.21 as per the release notes at:

https://mariadb.com/kb/en/mariadb/mariadb-10021-release-notes/

Comment 2 Huzaifa S. Sidhpurwala 2015-10-29 06:52:30 UTC
Attached is a diff between mysql-5.5.45 and mysql-5.5.44. 

Looking at the diff, it seems this issue was related to the "mysqlslap" utility. There was a buffer overflow when using this particular diagnostic utility, which could result in arbitrary code execution. This is also suggested by the Changelog as seen in the attachment.

Based on the this, it seems this issue should more likely be impact=moderate, rather than important

Comment 3 Huzaifa S. Sidhpurwala 2015-10-29 06:53:41 UTC
Created attachment 1087395 [details]
Relevant parts diff between mysql-5.5.45 and mysql-5.5.44

Comment 4 Huzaifa S. Sidhpurwala 2015-10-29 07:01:23 UTC
Created mariadb tracking bugs for this issue:

Affects: fedora-all [bug 1276224]

Comment 5 Huzaifa S. Sidhpurwala 2015-10-29 07:01:36 UTC
Created community-mysql tracking bugs for this issue:

Affects: fedora-all [bug 1276223]

Comment 6 Huzaifa S. Sidhpurwala 2015-10-29 07:01:47 UTC
Created mariadb-galera tracking bugs for this issue:

Affects: fedora-all [bug 1276225]

Comment 8 Tomas Hoger 2016-01-25 22:16:05 UTC
Oracle CPU indicates this issue was fixed in MySQL 5.5.45 and 5.6.26, hence it was already corrected in the following updates released in August 2015:

Red Hat Enterprise Linux 5 - mysql55-mysql
  https://rhn.redhat.com/errata/RHSA-2015-1628.html

Red Hat Software Collections - mysql55-mysql
  https://rhn.redhat.com/errata/RHSA-2015-1629.html

Red Hat Software Collections - rh-mysql56-mysql
  https://rhn.redhat.com/errata/RHSA-2015-1630.html

Comment 9 Tomas Hoger 2016-02-02 20:40:21 UTC
I concur with the finding in comment 2.  The mysqlslap fix is the only client-related change in 5.5.45.  Upstream commit link is:

https://github.com/mysql/mysql-server/commit/044e3b1d07c0854c39178d3054ab0cd0a3188436

This patch fixes a buffer overflow in the command line argument parsing.  So there's no trust boundary crossed, and this should not be called security at all.  Additionally, this fix protects against strncpy() buffer overflow, which is caught by FORTIFY_SOURCE, which limits the impact to application abort.

Comment 12 errata-xmlrpc 2016-03-31 21:56:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:0534 https://rhn.redhat.com/errata/RHSA-2016-0534.html

Comment 14 errata-xmlrpc 2016-05-26 08:39:23 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS

Via RHSA-2016:1132 https://access.redhat.com/errata/RHSA-2016:1132

Comment 16 errata-xmlrpc 2016-07-25 08:26:33 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2016:1481 https://rhn.redhat.com/errata/RHSA-2016-1481.html