Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. External References: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Created community-mysql tracking bugs for this issue: Affects: fedora-all [bug 1602383]
Created mariadb tracking bugs for this issue: Affects: fedora-all [bug 1602428]
Looking at the release notes for and changes included in the relevant MySQL versions, this CVE is apparently for this change: A heap overflow vulnerability in the MySQL client library was fixed. (Bug #27980823) https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-41.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-23.html Relevant upstream commit is: https://github.com/mysql/mysql-server/commit/e48d775c6f066add457fa8cfb2ebc4d5ff0c7613 This addresses a possible heap-based buffer overflow that may be triggered by a malicious server sending a malformed MySQL protocol data.
MariaDB was fixed via the following commit in versions 5.5.61, 10.0.35, 10.1.33, and 10.2.15: https://github.com/MariaDB/server/commit/1d58d184c2c4ddd8a3b2be6f86d76c4e57bbe14f This problem was also addressed in mariadb-connector-c in version 3.0.5: https://github.com/MariaDB/mariadb-connector-c/commit/27b2f3d1f1550dfaee0f63a331a406ab31c1b37e https://mariadb.com/kb/en/library/mariadb-connector-c-305-release-notes/
Created mariadb-connector-c tracking bugs for this issue: Affects: fedora-27 [bug 1616261]
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Via RHSA-2018:3655 https://access.redhat.com/errata/RHSA-2018:3655
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:1258
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2327 https://access.redhat.com/errata/RHSA-2019:2327