Multiple SQL injection flaws were found in the way the binlog functionality (routines producing events describing database changes such as table creation operations or changes to table data) of MySQL, a multi-user, multi-threaded SQL database server, performed sanitization of table names and other fields prior creating particular log entry. Authorised database users (with privilege to modify tables) could use this flaw to inject arbitrary SQL query into subsequently generated binlog entries. References: [1] https://mariadb.atlassian.net/browse/MDEV-382 MariaDB patches: [2] http://bazaar.launchpad.net/~maria-captains/maria/5.1/revision/3151.1.1 (against 5.1 branch) [3] http://bazaar.launchpad.net/~maria-captains/maria/5.2/revision/3163.1.1 (against 5.2 branch) [4] http://bazaar.launchpad.net/~maria-captains/maria/5.3/revision/3556.1.2 (against 5.3 branch) [5] http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/3508 (against 5.5 branch) MySQL bug: [6] http://bugs.mysql.com/66550
*** Bug 855539 has been marked as a duplicate of this bug. ***
A MySQL bug entry is available for this issue: http://bugs.mysql.com/bug.php?id=66550
Public via http://www.openwall.com/lists/oss-security/2012/09/11/4
Created mysql tracking bugs for this issue Affects: fedora-all [bug 863320]
Following blog post suggests that the fix for this issue is included in upstream MySQL 5.5.29, but it does not completely and correctly resolve the issue: http://www.mysqlperformanceblog.com/2013/01/13/cve-2012-4414-in-mysql-5-5-29-and-percona-server-5-5-29/
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2012-4414