| Summary: | mysql: DoS (crash) by performing EXPLAIN for a SELECT from a derived table query in prepared-statement mode (MySQL bug#54488) | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | byte, tgl |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-02-14 14:04:27 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | |||
| Bug Blocks: | 717721 | ||
|
Description
Jan Lieskovsky
2011-06-29 15:11:41 UTC
Public PoC from [2]: ==================== drop table if exists `t1`; create table `t1`(`a` int)engine=myisam; insert into `t1` values (1),(1); prepare `stmt` from 'explain select 1 from `t1` where(select(select 1 from `t1` group by `a`))'; execute `stmt` ; This issue did NOT affect the version of the mysql package, as shipped with Red Hat Enterprise Linux 4. This issue affects the version of the mysql package, as shipped with Red Hat Enterprise Linux 5. This issue did NOT affect the version of the mysql package, as shipped with Red Hat Enterprise Linux 6. -- This issue did NOT affect the versions of the mysql package, as shipped with Fedora release of 14 and 15. (In reply to comment #2) > This issue affects the version of the mysql package, as shipped with > Red Hat Enterprise Linux 5. The mysql package in Red Hat Enterprise Linux 5 has been upgraded to version 5.0.95 via RHSA-2012:0127 security advisory: https://rhn.redhat.com/errata/RHSA-2012-0127.html, and therefore this issue has been addressed in Red Hat Enterprise Linux 5 too. |