Hello

On 2006-06-15 Moritz Muehlenhoff wrote:
> Christian Hammers wrote:
> > Hey
> > 
> > Long time no read :) But I guess the attached bug justifies a DSA, or?
> > I verified that it really crashes the whole server and not only the
> > one connection that is used (see below). The patch from 4.1 and 5.0
> > looks identical and very easy to backport (one line only).
> 
> If the whole mysql server can be crashed a DSA is justified, yes.
> 
> > Should I prepare packages?
> 
> Please do.

I found out that 3.23 (woody) and 4.0 (sarge) are not vulnerable as the
function str_to_date() was introduced in 4.1.1.

Packages for 4.1 (sarge) can be found on
  http://www.lathspell.de/linux/debian/mysql/sarge-4.1/

The patch from the last DSA has been renamed from
64_SECURITY_CVE-2006-XXXX.dpatch to 64_SECURITY_CVE-2006-2753.dpatch, 
I hope you don't mind that this is in the .diff.

> > AFAIK there's no CVE number assigned to this, can you register one?
> 
> If an update is public through a place like Bugtraq CVE assignments are
> done through MITRE, it'll probably trickle in very soon. We'll keep you
> posted.

The new CVE-Id should, once it is known, replace the XXXX in 
* the 65_SECURITY_CVE-2006-XXXX.dpatch filename
* the comment in this file (2x) and 
* the debian/changelog file (1x)

I verified that with this patch the function returns NULL and no longer
crashs the server.

bye,

-christian-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to