Bug 1274764 (CVE-2015-4819)
Summary: | CVE-2015-4819 mysql: unspecified vulnerability related to Client programs (CPU October 2015) | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Martin Prpič <mprpic> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | abaron, apevec, ayoung, chrisw, cvsbot-xmlrpc, dallan, databases-maint, dciabrin, gkotton, hhorak, jjoyce, jorton, jschluet, jstanek, kbasil, lhh, lpeer, markmc, mbayer, mmaslano, mmuzila, rbryant, sclewis, srevivo, tdecacqu | ||||
Target Milestone: | --- | Keywords: | Reopened, Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | mysql 5.5.45, mysql 5.6.26, mariadb 5.5.45, mariadb 10.1.8, mariadb 10.0.21 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2019-06-08 02:44:27 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1276223, 1276224, 1276225, 1304515, 1304516, 1330444, 1330445, 1342454 | ||||||
Bug Blocks: | 1274745 | ||||||
Attachments: |
|
Description
Martin Prpič
2015-10-23 13:50:18 UTC
This issue was addressed in mariadb-10.0.21 as per the release notes at: https://mariadb.com/kb/en/mariadb/mariadb-10021-release-notes/ Attached is a diff between mysql-5.5.45 and mysql-5.5.44. Looking at the diff, it seems this issue was related to the "mysqlslap" utility. There was a buffer overflow when using this particular diagnostic utility, which could result in arbitrary code execution. This is also suggested by the Changelog as seen in the attachment. Based on the this, it seems this issue should more likely be impact=moderate, rather than important Created attachment 1087395 [details]
Relevant parts diff between mysql-5.5.45 and mysql-5.5.44
Created mariadb tracking bugs for this issue: Affects: fedora-all [bug 1276224] Created community-mysql tracking bugs for this issue: Affects: fedora-all [bug 1276223] Created mariadb-galera tracking bugs for this issue: Affects: fedora-all [bug 1276225] Oracle CPU indicates this issue was fixed in MySQL 5.5.45 and 5.6.26, hence it was already corrected in the following updates released in August 2015: Red Hat Enterprise Linux 5 - mysql55-mysql https://rhn.redhat.com/errata/RHSA-2015-1628.html Red Hat Software Collections - mysql55-mysql https://rhn.redhat.com/errata/RHSA-2015-1629.html Red Hat Software Collections - rh-mysql56-mysql https://rhn.redhat.com/errata/RHSA-2015-1630.html I concur with the finding in comment 2. The mysqlslap fix is the only client-related change in 5.5.45. Upstream commit link is: https://github.com/mysql/mysql-server/commit/044e3b1d07c0854c39178d3054ab0cd0a3188436 This patch fixes a buffer overflow in the command line argument parsing. So there's no trust boundary crossed, and this should not be called security at all. Additionally, this fix protects against strncpy() buffer overflow, which is caught by FORTIFY_SOURCE, which limits the impact to application abort. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0534 https://rhn.redhat.com/errata/RHSA-2016-0534.html This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Via RHSA-2016:1132 https://access.redhat.com/errata/RHSA-2016:1132 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2016:1481 https://rhn.redhat.com/errata/RHSA-2016-1481.html |