Bug 814282 (CVE-2012-0583) - CVE-2012-0583 mysql: unspecified DoS vulnerability in MyISAM (Oracle CPU April 2012)
Summary: CVE-2012-0583 mysql: unspecified DoS vulnerability in MyISAM (Oracle CPU Apri...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-0583
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 814308 mysql-cpu-2012-04
TreeView+ depends on / blocked
 
Reported: 2012-04-19 14:20 UTC by Jan Lieskovsky
Modified: 2021-02-24 12:38 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-10-24 18:29:43 UTC


Attachments (Terms of Use)

Description Jan Lieskovsky 2012-04-19 14:20:48 UTC
Unspecified vulnerability in the MyISAM subcomponent of the Oracle MySQL server could allow authenticated database users to cause a hang or frequently repeatable crash of the MySQL server via multiple protocols.

Upstream announced, supported MySQL server versions, vulnerable to this flaw:
5.1.60 and earlier and 5.5.19 and earlier

References:
[1] http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html#AppendixMSQL
[2] http://www.oracle.com/technetwork/topics/security/cpuapr2012verbose-366316.html#Oracle%20MySQL

Comment 4 Tomas Hoger 2012-10-31 13:28:06 UTC
According to upstream advisory, this issue was fixed in version 5.1.61.  Red Hat Enterprise Linux 6 mysql packages were previously updated to 5.1.61 via RHSA-2012:0105:

  https://rhn.redhat.com/errata/RHSA-2012-0105.html

Comment 5 Vincent Danen 2013-10-24 18:29:43 UTC
Statement:

On Red Hat Enterprise Linux 5.10, new MySQL 5.5 packages are available which are not vulnerable to this issue.  Future updates for MySQL 5.0 will no longer be made available (mysql-5.0.* and related packages); security advisories will be provided only for MySQL 5.5.  Please refer to https://rhn.redhat.com/errata/RHEA-2013-1330.html for further information.


Note You need to log in before you can comment on or make changes to this bug.