Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.44 and earlier and 5.6.25 and earlier. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. External References: http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixMSQL
This issue was addressed in mariadb-10.0.21 as per the release notes at: https://mariadb.com/kb/en/mariadb/mariadb-10021-release-notes/
Attached is a diff between mysql-5.5.45 and mysql-5.5.44. Looking at the diff, it seems this issue was related to the "mysqlslap" utility. There was a buffer overflow when using this particular diagnostic utility, which could result in arbitrary code execution. This is also suggested by the Changelog as seen in the attachment. Based on the this, it seems this issue should more likely be impact=moderate, rather than important
Created attachment 1087395 [details] Relevant parts diff between mysql-5.5.45 and mysql-5.5.44
Created mariadb tracking bugs for this issue: Affects: fedora-all [bug 1276224]
Created community-mysql tracking bugs for this issue: Affects: fedora-all [bug 1276223]
Created mariadb-galera tracking bugs for this issue: Affects: fedora-all [bug 1276225]
Oracle CPU indicates this issue was fixed in MySQL 5.5.45 and 5.6.26, hence it was already corrected in the following updates released in August 2015: Red Hat Enterprise Linux 5 - mysql55-mysql https://rhn.redhat.com/errata/RHSA-2015-1628.html Red Hat Software Collections - mysql55-mysql https://rhn.redhat.com/errata/RHSA-2015-1629.html Red Hat Software Collections - rh-mysql56-mysql https://rhn.redhat.com/errata/RHSA-2015-1630.html
I concur with the finding in comment 2. The mysqlslap fix is the only client-related change in 5.5.45. Upstream commit link is: https://github.com/mysql/mysql-server/commit/044e3b1d07c0854c39178d3054ab0cd0a3188436 This patch fixes a buffer overflow in the command line argument parsing. So there's no trust boundary crossed, and this should not be called security at all. Additionally, this fix protects against strncpy() buffer overflow, which is caught by FORTIFY_SOURCE, which limits the impact to application abort.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0534 https://rhn.redhat.com/errata/RHSA-2016-0534.html
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Via RHSA-2016:1132 https://access.redhat.com/errata/RHSA-2016:1132
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2016:1481 https://rhn.redhat.com/errata/RHSA-2016-1481.html