A flaw in MySQL versions prior to 5.1.51 [1] was reported [2] that could allow an authenticated user to kill connections to MySQL. Upstream describes the problem as follows: IN quantified predicates are never executed directly. They are rather wrapped inside nodes called IN Optimizers (Item_in_optimizer) which take care of the execution. However, this is not done during view preparation. Unfortunately the LIKE predicate pre-evaluates constant right-hand side arguments even during name resolution within view preparation. Likely this is meant as an optimization. There is a patch for this available [3]. [1] http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html [2] http://bugs.mysql.com/bug.php?id=54568 [3] http://lists.mysql.com/commits/112602
This issue has been assigned the name CVE-2010-3836: http://article.gmane.org/gmane.comp.security.oss.general/3627
Created attachment 453415 [details] upstream patch
It appears that the patch that actually went in for this is not the first one linked to in the bugzilla entry, but rather http://lists.mysql.com/commits/115062
This issue did NOT affect the versions of the mysql package, as shipped with Red Hat Enterprise Linux 3 and 4. This issue affects the version of mysql package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the version of mysql package, as shipped with Fedora 12 and 13.
Created mysql tracking bugs for this issue Affects: fedora-12 [bug 645647]
Created mysql tracking bugs for this issue Affects: fedora-13 [bug 645651]
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2010:0825 https://rhn.redhat.com/errata/RHSA-2010-0825.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0164 https://rhn.redhat.com/errata/RHSA-2011-0164.html