Your message dated Wed, 30 Aug 2006 23:05:18 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#375694: fixed in mysql-dfsg-4.1 4.1.11a-4sarge5
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: mysql-server-4.1
Version: 4.1.11a-4sarge4
Severity: maybe critical
The bug can be reproduced by entering the following SQL code:
select date_format('%Y-%m-%d %H:%i:%s', 1151414896);
It's not correct SQL, and I expect a syntax error, but it should not crash the server!
I think it can be simplified to:
select date_format('%d%s', 1);
I tried on different machines:
Debian GNU/Linux 3.1, mysql-server-4.1 4.1.11a-4sarge4
Linux skool 2.6.11 #2 SMP Thu May 26 20:53:11 CEST 2005 i686 GNU/Linux
Debian GNU/Linux 3.0, mysql-server-4.1 4.1.11a-4sarge4
Linux KSKO04 2.4.23-xfs #1 SMP Mi Dez 10 22:25:03 CET 2003 i686 GNU/Linux
Sample Run:
[EMAIL PROTECTED]:~$ mysql -u root -h 192.168.1.104
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 219 to server version: 4.1.11-Debian_4sarge2-log
Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
mysql> select date_format('%Y-%m-%d %H:%i:%s', 1151414896);
ERROR 2013 (HY000): Lost connection to MySQL server during query
mysql> select date_format('%Y-%m-%d %H:%i:%s', 1151414896);
ERROR 2006 (HY000): MySQL server has gone away
No connection. Trying to reconnect...
Connection id: 1
Current database: *** NONE ***
ERROR 2013 (HY000): Lost connection to MySQL server during query
mysql>
mysql> select;
ERROR 2006 (HY000): MySQL server has gone away
....
logs from syslog:
Jun 27 17:19:25 skool mysqld[28116]: mysqld got signal 11;
Jun 27 17:19:25 skool mysqld[28116]: This could be because you hit a bug. It is also possible that this binary
Jun 27 17:19:25 skool mysqld[28116]: or one of the libraries it was linked against is corrupt, improperly built,
Jun 27 17:19:25 skool mysqld[28116]: or misconfigured. This error can also be caused by malfunctioning hardware.
Jun 27 17:19:25 skool mysqld[28116]: We will try our best to scrape up some info that will hopefully help diagnose
Jun 27 17:19:25 skool mysqld[28116]: the problem, but since we have already crashed, something is definitely wrong
Jun 27 17:19:25 skool mysqld[28116]: and this may fail.
Jun 27 17:19:25 skool mysqld[28116]:
Jun 27 17:19:25 skool mysqld[28116]: key_buffer_size=16777216
Jun 27 17:19:25 skool mysqld[28116]: read_buffer_size=131072
Jun 27 17:19:25 skool mysqld[28116]: max_used_connections=11
Jun 27 17:19:25 skool mysqld[28116]: max_connections=100
Jun 27 17:19:25 skool mysqld[28116]: threads_connected=2
Jun 27 17:19:25 skool mysqld[28116]: It is possible that mysqld could use up to
Jun 27 17:19:25 skool mysqld[28116]: key_buffer_size + (read_buffer_size + sort_buffer_size)*max_connections = 233983 K
Jun 27 17:19:25 skool mysqld[28116]: bytes of memory
Jun 27 17:19:25 skool mysqld[28116]: Hope that's ok; if not, decrease some variables in the equation.
Jun 27 17:19:25 skool mysqld[28116]:
Jun 27 17:19:25 skool mysqld[28116]: thd=0x8bd1158
Jun 27 17:19:25 skool mysqld[28116]: Attempting backtrace. You can use the following information to find out
Jun 27 17:19:25 skool mysqld[28116]: where mysqld died. If you see no messages after this, something went
Jun 27 17:19:25 skool mysqld[28116]: terribly wrong...
Jun 27 17:19:25 skool mysqld[28116]: Cannot determine thread, fp=0xb147fc7c, backtrace may not be correct.
Jun 27 17:19:25 skool mysqld[28116]: Stack range sanity check OK, backtrace follows:
Jun 27 17:19:25 skool mysqld[28116]: 0x818935f
Jun 27 17:19:25 skool mysqld[28116]: 0xffffe420
Jun 27 17:19:25 skool mysqld[28116]: 0x38363032
Jun 27 17:19:25 skool mysqld[28116]: Stack trace seems successful - bottom reached
Jun 27 17:19:25 skool mysqld[28116]: Please read http://dev.mysql.com/doc/mysql/en/Using_stack_trace.html and follow instruc
tions on how to resolve the stack trace. Resolved
Jun 27 17:19:25 skool mysqld[28116]: stack trace is much more helpful in diagnosing the problem, so please do
Jun 27 17:19:25 skool mysqld[28116]: resolve it
Jun 27 17:19:25 skool mysqld[28116]: Trying to get some variables.
Jun 27 17:19:25 skool mysqld[28116]: Some pointers may be invalid and cause the dump to abort...
Jun 27 17:19:25 skool mysqld[28116]: thd->query at 0x8bd45f0 = select date_format('%Y-%m-%d %H:%i:%s', 1151414896)
Jun 27 17:19:25 skool mysqld[28116]: thd->thread_id=19
Jun 27 17:19:25 skool mysqld[28116]: The manual page at http://www.mysql.com/doc/en/Crashing.html contains
Jun 27 17:19:25 skool mysqld[28116]: information that should help you find out what is causing the crash.
Jun 27 17:19:25 skool mysqld_safe[1653]: Number of processes running now: 0
Jun 27 17:19:25 skool mysqld_safe[1655]: restarted
Jun 27 17:19:25 skool mysqld[1658]: 060627 17:19:25 InnoDB: Database was not shut down normally!
Jun 27 17:19:25 skool mysqld[1658]: InnoDB: Starting crash recovery.
Jun 27 17:19:25 skool mysqld[1658]: InnoDB: Reading tablespace information from the .ibd files...
Jun 27 17:19:25 skool mysqld[1658]: InnoDB: Restoring possible half-written data pages from the doublewrite
Jun 27 17:19:25 skool mysqld[1658]: InnoDB: buffer...
Jun 27 17:19:25 skool mysqld[1658]: 060627 17:19:25 InnoDB: Starting log scan based on checkpoint at
Jun 27 17:19:25 skool mysqld[1658]: InnoDB: log sequence number 0 5847414.
Jun 27 17:19:25 skool mysqld[1658]: InnoDB: Doing recovery: scanned up to log sequence number 0 5847414
Jun 27 17:19:25 skool mysqld[1658]: InnoDB: Last MySQL binlog file position 0 79, file name /var/log/mysql/mysql-bin.000204
Jun 27 17:19:25 skool mysqld[1658]: 060627 17:19:25 InnoDB: Flushing modified pages from the buffer pool...
Jun 27 17:19:26 skool mysqld[1658]: 060627 17:19:26 InnoDB: Started; log sequence number 0 5847414
Jun 27 17:19:26 skool mysqld[1658]: /usr/sbin/mysqld: ready for connections.
Jun 27 17:19:26 skool mysqld[1658]: Version: '4.1.11-Debian_4sarge4-log' socket: '/var/run/mysqld/mysqld.sock' port: 3306 Source distribution
jean-david maillefer - developer/network manager
http://www.kesako.ch
_________________
[kesako] - IT & internet solutions
18, rue des terreaux
case postale 967
CH-1001 lausanne
T: +41-21 3517700
F: +41-21 3517701
plan a meeting http://agenda.kesako.ch/meet/jean-david
Ce message et les documents qui y sont attachés sont confidentiels et couverts par le secret professionnel. Ils ne sont destinés qu'aux seules personnes désignées ci-dessus. Ils ne doivent pas être diffusés ni leur contenu utilisé ou divulgué. Dans le cas où ce message et les documents attachés vous seraient parvenus par erreur, nous vous remercions de les détruire aussitôt et de nous informer de l'erreur commise.
This message and the attached documents are confidential and covered by professional secrecy. They are intended to their adresses only. They should not be used for any purpose and their content should not be disclosed to anyone. In case you have received this message and the attached documents by mistake, please advise us and delete them immediately.
|
--- End Message ---
--- Begin Message ---
Source: mysql-dfsg-4.1
Source-Version: 4.1.11a-4sarge5
We believe that the bug you reported is fixed in the latest version of
mysql-dfsg-4.1, which is due to be installed in the Debian FTP archive:
libmysqlclient14-dev_4.1.11a-4sarge5_i386.deb
to pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge5_i386.deb
libmysqlclient14_4.1.11a-4sarge5_i386.deb
to pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge5_i386.deb
mysql-client-4.1_4.1.11a-4sarge5_i386.deb
to pool/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge5_i386.deb
mysql-common-4.1_4.1.11a-4sarge5_all.deb
to pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.11a-4sarge5_all.deb
mysql-dfsg-4.1_4.1.11a-4sarge5.diff.gz
to pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge5.diff.gz
mysql-dfsg-4.1_4.1.11a-4sarge5.dsc
to pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge5.dsc
mysql-server-4.1_4.1.11a-4sarge5_i386.deb
to pool/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge5_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Christian Hammers <[EMAIL PROTECTED]> (supplier of updated mysql-dfsg-4.1
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 16 Jun 2006 09:52:12 +0000
Source: mysql-dfsg-4.1
Binary: libmysqlclient14-dev mysql-common-4.1 libmysqlclient14 mysql-server-4.1
mysql-client-4.1
Architecture: source i386 all
Version: 4.1.11a-4sarge5
Distribution: stable-security
Urgency: low
Maintainer: Christian Hammers <[EMAIL PROTECTED]>
Changed-By: Christian Hammers <[EMAIL PROTECTED]>
Description:
libmysqlclient14 - mysql database client library
libmysqlclient14-dev - mysql database development files
mysql-client-4.1 - mysql database client binaries
mysql-common-4.1 - mysql database common files (e.g. /etc/mysql/my.cnf)
mysql-server-4.1 - mysql database server binaries
Closes: 373913 375694
Changes:
mysql-dfsg-4.1 (4.1.11a-4sarge5) stable-security; urgency=low
.
* Security upload prepared for the security team by the Debian MySQL
package maintainers.
* Fixed DoS bug where any user could crash the server with
"SELECT str_to_date(1, NULL);" (CVE-2006-3081).
The vulnerability was discovered by Kanatoko <[EMAIL PROTECTED]>.
Closes: #373913
* Fixed DoS bug where any user could crash the server with
"SELECT date_format('%d%s', 1); (CVE-2006-3469).
The vulnerability was discovered by Maillefer Jean-David
<[EMAIL PROTECTED]> and filed as MySQL bug #20729.
Closes: #375694
Files:
9cd4f7df9345856d06846e0ddb50b9ee 1021 misc optional
mysql-dfsg-4.1_4.1.11a-4sarge5.dsc
e45db0b01b3adaf09500d54090f3a1e1 168442 misc optional
mysql-dfsg-4.1_4.1.11a-4sarge5.diff.gz
e8115191126dc0b373a53024e5c78733 36520 misc optional
mysql-common-4.1_4.1.11a-4sarge5_all.deb
ab5768abe67a1d21c714a078f2ec86f0 1418036 libs optional
libmysqlclient14_4.1.11a-4sarge5_i386.deb
bf891e68e488947fd28a940a367d722f 5643732 libdevel optional
libmysqlclient14-dev_4.1.11a-4sarge5_i386.deb
f5d4a9e5b289d895ba021190f907829f 830724 misc optional
mysql-client-4.1_4.1.11a-4sarge5_i386.deb
b580eeaf7a3806b95a07435acbe48e27 14558034 misc optional
mysql-server-4.1_4.1.11a-4sarge5_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEsq66Xm3vHE4uyloRAgB4AKDZu0uKZDSFB8uicz4G1oFrIR+YEwCgnzNr
E3zati36cyhJRqWDcL2bP4Q=
=HUF7
-----END PGP SIGNATURE-----
--- End Message ---