Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2006-3081
Vulnerability from cvelistv5
Published
2006-06-19 18:00
Modified
2024-08-07 18:16
Severity ?
EPSS score ?
Summary
mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:16:05.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mysql-select-dos(27212)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19929" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20060615 MySQL DoS", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "name": "TA06-208A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "20832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20832" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "20060614 MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/437145" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "MDKSA-2006:111", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "name": "20060615 Re: MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/437277" }, { "name": "DSA-1112", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "18439", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18439" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20871", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20871" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "20060615 Re: MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "name": "USN-306-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/306-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" }, { "name": "oval:org.mitre.oval:def:9516", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mysql-select-dos(27212)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19929" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20060615 MySQL DoS", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "name": "TA06-208A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "20832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20832" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "20060614 MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/437145" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "MDKSA-2006:111", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "name": "20060615 Re: MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/437277" }, { "name": "DSA-1112", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "18439", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18439" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20871", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20871" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "20060615 Re: MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "name": "USN-306-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/306-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" }, { "name": "oval:org.mitre.oval:def:9516", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mysql-select-dos(27212)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "name": "19929", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19929" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20060615 MySQL DoS", "refsource": "FULLDISC", "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "name": "TA06-208A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "20832", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20832" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "20060614 MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437145" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "MDKSA-2006:111", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "name": "20060615 Re: MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437277" }, { "name": "DSA-1112", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "18439", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18439" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20871", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20871" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "20060615 Re: MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "name": "USN-306-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/306-1/" }, { "name": "http://bugs.mysql.com/bug.php?id=15828", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" }, { "name": "oval:org.mitre.oval:def:9516", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3081", "datePublished": "2006-06-19T18:00:00", "dateReserved": "2006-06-19T00:00:00", "dateUpdated": "2024-08-07T18:16:05.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-3081\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-06-19T18:02:00.000\",\"lastModified\":\"2024-11-21T00:12:46.580\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.\"},{\"lang\":\"es\",\"value\":\"mysqld en MySQL v4.1.x antes de v4.1.18, v5.0.x antes de v5.0.19, y v5.1.x antes de v5.1.6 permite causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a usuarios remotos autorizados a trav\u00e9s de un segundo argumento nulo para la funci\u00f3n STR_TO_DATE.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4D224C-8ABF-41A0-A7BE-C10C2387DE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C93CE88F-2941-4A08-9472-359CF214F81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC198CDB-CAC0-41DD-9FCD-42536E7FE11A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77A2761-2B44-4061-9C29-A54F90A1AD83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B3AD851-056F-4E57-B85B-4AC5A5A20C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD24EA8C-4FCA-4F40-B2EA-7DFA49432483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754B78F2-A03C-40BE-812B-F5E57B93D20B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35BED939-3366-4CBF-B6BF-29C0C42E97F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED5BA55-FF4F-4F89-89B1-554624DDA1AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32CA2F70-77E4-4280-B845-4CE5774162C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA788329-9A66-49EA-B7E4-E465C0E7E320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4297E6B7-6C5A-4D52-A66B-F9D1AE17E988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6769975-47A4-4D0A-9181-F59776D13D38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"053ACE9B-A146-42C0-ADB2-47F6119965D8\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.mysql.com/bug.php?id=15828\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305214\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19929\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20832\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20871\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1112\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:111\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0083.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/437145\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/437277\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/437571/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/18439\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-208A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0930\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27212\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/306-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugs.mysql.com/bug.php?id=15828\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305214\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19929\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20832\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20871\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:111\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0083.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/437145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/437277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/437571/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/18439\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-208A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27212\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/306-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2006-3081
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2006-3081", "description": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.", "id": "GSD-2006-3081", "references": [ "https://www.suse.com/security/cve/CVE-2006-3081.html", "https://www.debian.org/security/2006/dsa-1112", "https://access.redhat.com/errata/RHSA-2007:0083", "https://access.redhat.com/errata/RHSA-2006:0544" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-3081" ], "details": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.", "id": "GSD-2006-3081", "modified": "2023-12-13T01:19:57.233723Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mysql-select-dos(27212)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "name": "19929", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19929" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20060615 MySQL DoS", "refsource": "FULLDISC", "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "name": "TA06-208A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "20832", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20832" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "20060614 MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437145" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "MDKSA-2006:111", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "name": "20060615 Re: MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437277" }, { "name": "DSA-1112", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "18439", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18439" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20871", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20871" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "20060615 Re: MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "name": "USN-306-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/306-1/" }, { "name": "http://bugs.mysql.com/bug.php?id=15828", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" }, { "name": "oval:org.mitre.oval:def:9516", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3081" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "20060614 MySQL DoS", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/437145" }, { "name": "20060615 Re: MySQL DoS", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/437277" }, { "name": "20060615 MySQL DoS", "refsource": "FULLDISC", "tags": [], "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "name": "http://bugs.mysql.com/bug.php?id=15828", "refsource": "CONFIRM", "tags": [], "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913", "refsource": "CONFIRM", "tags": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "name": "18439", "refsource": "BID", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/18439" }, { "name": "20832", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20832" }, { "name": "19929", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "name": "20871", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20871" }, { "name": "DSA-1112", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "TA06-208A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "24479", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/24479" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "MDKSA-2006:111", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "name": "TA07-072A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "mysql-select-dos(27212)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "name": "oval:org.mitre.oval:def:9516", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" }, { "name": "USN-306-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/306-1/" }, { "name": "20060615 Re: MySQL DoS", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2019-12-17T17:13Z", "publishedDate": "2006-06-19T18:02Z" } } }
rhsa-2006_0544
Vulnerability from csaf_redhat
Published
2006-06-09 15:00
Modified
2024-11-22 00:53
Summary
Red Hat Security Advisory: mysql security update
Notes
Topic
Updated mysql packages that fix multiple security flaws are now available.
This update has been rated as having important security impact by the Red Hat
Security Response Team.
Details
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
client/server implementation consisting of a server daemon (mysqld) and
many different client programs and libraries.
A flaw was found in the way the MySQL mysql_real_escape() function escaped
strings when operating in a multibyte character encoding. An attacker
could provide an application a carefully crafted string containing
invalidly-encoded characters which may be improperly escaped, leading to
the injection of malicious SQL commands. (CVE-2006-2753)
An information disclosure flaw was found in the way the MySQL server
processed malformed usernames. An attacker could view a small portion
of server memory by supplying an anonymous login username which was not
null terminated. (CVE-2006-1516)
An information disclosure flaw was found in the way the MySQL server
executed the COM_TABLE_DUMP command. An authenticated malicious user could
send a specially crafted packet to the MySQL server which returned
random unallocated memory. (CVE-2006-1517)
A log file obfuscation flaw was found in the way the mysql_real_query()
function creates log file entries. An attacker with the the ability to call
the mysql_real_query() function against a mysql server can obfuscate the
entry the server will write to the log file. However, an attacker needed
to have complete control over a server in order to attempt this attack.
(CVE-2006-0903)
This update also fixes numerous non-security-related flaws, such as
intermittent authentication failures.
All users of mysql are advised to upgrade to these updated packages
containing MySQL version 4.1.20, which is not vulnerable to these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated mysql packages that fix multiple security flaws are now available.\n\nThis update has been rated as having important security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld) and\nmany different client programs and libraries.\n\nA flaw was found in the way the MySQL mysql_real_escape() function escaped\nstrings when operating in a multibyte character encoding. An attacker\ncould provide an application a carefully crafted string containing\ninvalidly-encoded characters which may be improperly escaped, leading to\nthe injection of malicious SQL commands. (CVE-2006-2753)\n\nAn information disclosure flaw was found in the way the MySQL server\nprocessed malformed usernames. An attacker could view a small portion\nof server memory by supplying an anonymous login username which was not\nnull terminated. (CVE-2006-1516)\n\nAn information disclosure flaw was found in the way the MySQL server\nexecuted the COM_TABLE_DUMP command. An authenticated malicious user could\nsend a specially crafted packet to the MySQL server which returned\nrandom unallocated memory. (CVE-2006-1517)\n\nA log file obfuscation flaw was found in the way the mysql_real_query()\nfunction creates log file entries. An attacker with the the ability to call\nthe mysql_real_query() function against a mysql server can obfuscate the\nentry the server will write to the log file. However, an attacker needed\nto have complete control over a server in order to attempt this attack.\n(CVE-2006-0903)\n\nThis update also fixes numerous non-security-related flaws, such as\nintermittent authentication failures.\n\nAll users of mysql are advised to upgrade to these updated packages\ncontaining MySQL version 4.1.20, which is not vulnerable to these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0544", "url": "https://access.redhat.com/errata/RHSA-2006:0544" }, { "category": "external", "summary": "http://lists.mysql.com/announce/364", "url": "http://lists.mysql.com/announce/364" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "183260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=183260" }, { "category": "external", "summary": "183277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=183277" }, { "category": "external", "summary": "190743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190743" }, { "category": "external", "summary": "190863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190863" }, { "category": "external", "summary": "193827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193827" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0544.json" } ], "title": "Red Hat Security Advisory: mysql security update", "tracking": { "current_release_date": "2024-11-22T00:53:13+00:00", "generator": { "date": "2024-11-22T00:53:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0544", "initial_release_date": "2006-06-09T15:00:00+00:00", "revision_history": [ { "date": "2006-06-09T15:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-07-19T16:06:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:53:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "product": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "product_id": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.20-1.RHEL4.1?arch=ia64" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "product": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "product_id": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.20-1.RHEL4.1?arch=ia64" } } }, { "category": "product_version", "name": "mysql-0:4.1.20-1.RHEL4.1.ia64", "product": { "name": "mysql-0:4.1.20-1.RHEL4.1.ia64", "product_id": "mysql-0:4.1.20-1.RHEL4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.20-1.RHEL4.1?arch=ia64" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.20-1.RHEL4.1.ia64", "product": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ia64", "product_id": "mysql-server-0:4.1.20-1.RHEL4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.20-1.RHEL4.1?arch=ia64" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "product": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "product_id": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-1.RHEL4.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mysql-0:4.1.20-1.RHEL4.1.i386", "product": { "name": "mysql-0:4.1.20-1.RHEL4.1.i386", "product_id": "mysql-0:4.1.20-1.RHEL4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.20-1.RHEL4.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "product": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "product_id": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-1.RHEL4.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-bench-0:4.1.20-1.RHEL4.1.i386", "product": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.i386", "product_id": "mysql-bench-0:4.1.20-1.RHEL4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.20-1.RHEL4.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.20-1.RHEL4.1.i386", "product": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.i386", "product_id": "mysql-devel-0:4.1.20-1.RHEL4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.20-1.RHEL4.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.20-1.RHEL4.1.i386", "product": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.i386", "product_id": "mysql-server-0:4.1.20-1.RHEL4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.20-1.RHEL4.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "product": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "product_id": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.20-1.RHEL4.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "product": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "product_id": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.20-1.RHEL4.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-0:4.1.20-1.RHEL4.1.x86_64", "product": { "name": "mysql-0:4.1.20-1.RHEL4.1.x86_64", "product_id": "mysql-0:4.1.20-1.RHEL4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.20-1.RHEL4.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "product": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "product_id": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.20-1.RHEL4.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "product": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "product_id": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-1.RHEL4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mysql-0:4.1.20-1.RHEL4.1.src", "product": { "name": "mysql-0:4.1.20-1.RHEL4.1.src", "product_id": "mysql-0:4.1.20-1.RHEL4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.20-1.RHEL4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "product": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "product_id": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.20-1.RHEL4.1?arch=ppc" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "product": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "product_id": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.20-1.RHEL4.1?arch=ppc" } } }, { "category": "product_version", "name": "mysql-0:4.1.20-1.RHEL4.1.ppc", "product": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc", "product_id": "mysql-0:4.1.20-1.RHEL4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.20-1.RHEL4.1?arch=ppc" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.20-1.RHEL4.1.ppc", "product": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ppc", "product_id": "mysql-server-0:4.1.20-1.RHEL4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.20-1.RHEL4.1?arch=ppc" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "product": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "product_id": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-1.RHEL4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "mysql-0:4.1.20-1.RHEL4.1.ppc64", "product": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc64", "product_id": "mysql-0:4.1.20-1.RHEL4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.20-1.RHEL4.1?arch=ppc64" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "product": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "product_id": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-1.RHEL4.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "product": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "product_id": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.20-1.RHEL4.1?arch=s390x" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "product": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "product_id": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.20-1.RHEL4.1?arch=s390x" } } }, { "category": "product_version", "name": "mysql-0:4.1.20-1.RHEL4.1.s390x", "product": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390x", "product_id": "mysql-0:4.1.20-1.RHEL4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.20-1.RHEL4.1?arch=s390x" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390x", "product": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390x", "product_id": "mysql-server-0:4.1.20-1.RHEL4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.20-1.RHEL4.1?arch=s390x" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "product": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "product_id": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-1.RHEL4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mysql-0:4.1.20-1.RHEL4.1.s390", "product": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390", "product_id": "mysql-0:4.1.20-1.RHEL4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@4.1.20-1.RHEL4.1?arch=s390" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "product": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "product_id": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-1.RHEL4.1?arch=s390" } } }, { "category": "product_version", "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390", "product": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390", "product_id": "mysql-bench-0:4.1.20-1.RHEL4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@4.1.20-1.RHEL4.1?arch=s390" } } }, { "category": "product_version", "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390", "product": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390", "product_id": "mysql-devel-0:4.1.20-1.RHEL4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@4.1.20-1.RHEL4.1?arch=s390" } } }, { "category": "product_version", "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390", "product": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390", "product_id": "mysql-server-0:4.1.20-1.RHEL4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@4.1.20-1.RHEL4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.20-1.RHEL4.1.src" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.20-1.RHEL4.1.src" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.20-1.RHEL4.1.src" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" }, "product_reference": "mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0903", "discovery_date": "2006-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "194613" } ], "notes": [ { "category": "description", "text": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mysql log file obfuscation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0903" }, { "category": "external", "summary": "RHBZ#194613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=194613" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0903", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903" } ], "release_date": "2006-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-06-09T15:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0544" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Mysql log file obfuscation" }, { "cve": "CVE-2006-1516", "discovery_date": "2006-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618038" } ], "notes": [ { "category": "description", "text": "The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1516" }, { "category": "external", "summary": "RHBZ#1618038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618038" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1516", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1516" } ], "release_date": "2006-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-06-09T15:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0544" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-1517", "discovery_date": "2006-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618039" } ], "notes": [ { "category": "description", "text": "sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1517" }, { "category": "external", "summary": "RHBZ#1618039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1517", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1517" } ], "release_date": "2006-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-06-09T15:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0544" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-2753", "discovery_date": "2006-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618111" } ], "notes": [ { "category": "description", "text": "SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2753" }, { "category": "external", "summary": "RHBZ#1618111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2753", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2753" } ], "release_date": "2006-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-06-09T15:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0544" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-3081", "discovery_date": "2006-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618132" } ], "notes": [ { "category": "description", "text": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3081" }, { "category": "external", "summary": "RHBZ#1618132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618132" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081" } ], "release_date": "2006-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-06-09T15:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0544" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-4380", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618185" } ], "notes": [ { "category": "description", "text": "MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4380" }, { "category": "external", "summary": "RHBZ#1618185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4380", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4380" } ], "release_date": "2005-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-06-09T15:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:mysql-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-0:4.1.20-1.RHEL4.1.src", "4AS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4AS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.src", "4Desktop:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4Desktop:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-0:4.1.20-1.RHEL4.1.src", "4ES:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4ES:mysql-server-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-0:4.1.20-1.RHEL4.1.src", "4WS:mysql-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-bench-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.ppc64", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-debuginfo-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-devel-0:4.1.20-1.RHEL4.1.x86_64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.i386", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ia64", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.ppc", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.s390x", "4WS:mysql-server-0:4.1.20-1.RHEL4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0544" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2007_0083
Vulnerability from csaf_redhat
Published
2007-02-19 19:41
Modified
2024-11-22 01:46
Summary
Red Hat Security Advisory: mysql security update
Notes
Topic
Updated MySQL packages for the Red Hat Application Stack comprising the v1.1
release are now available.
This update also resolves some minor security issues rated as having low
security impact by the Red Hat Security Response Team.
Details
Several minor security issues were found in MySQL:
MySQL allowed remote authenticated users to create or access a database
when the database name differed only in case from a database for which they
had permissions. (CVE-2006-4226)
MySQL evaluated arguments in the wrong security context which allowed
remote authenticated users to gain privileges through a routine that had
been made available using GRANT EXECUTE. (CVE-2006-4227)
MySQL allowed a local user to access a table through a previously created
MERGE table, even after the user's privileges were revoked for the original
table, which might violate intended security policy. (CVE-2006-4031)
MySQL allowed authenticated users to cause a denial of service (crash) via
a NULL second argument to the str_to_date function. (CVE-2006-3081)
MySQL allowed local authenticated users to bypass logging mechanisms via
SQL queries that contain the NULL character, which were not properly
handled by the mysql_real_query function. (CVE-2006-0903)
Users of MySQL should upgrade to these updated packages, which resolve
these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated MySQL packages for the Red Hat Application Stack comprising the v1.1\nrelease are now available.\n\nThis update also resolves some minor security issues rated as having low\nsecurity impact by the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Several minor security issues were found in MySQL:\n\nMySQL allowed remote authenticated users to create or access a database\nwhen the database name differed only in case from a database for which they\nhad permissions. (CVE-2006-4226)\n\nMySQL evaluated arguments in the wrong security context which allowed\nremote authenticated users to gain privileges through a routine that had\nbeen made available using GRANT EXECUTE. (CVE-2006-4227)\n\nMySQL allowed a local user to access a table through a previously created\nMERGE table, even after the user\u0027s privileges were revoked for the original\ntable, which might violate intended security policy. (CVE-2006-4031)\n\nMySQL allowed authenticated users to cause a denial of service (crash) via\na NULL second argument to the str_to_date function. (CVE-2006-3081)\n\nMySQL allowed local authenticated users to bypass logging mechanisms via\nSQL queries that contain the NULL character, which were not properly\nhandled by the mysql_real_query function. (CVE-2006-0903)\n\nUsers of MySQL should upgrade to these updated packages, which resolve\nthese issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0083", "url": "https://access.redhat.com/errata/RHSA-2007:0083" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "228999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=228999" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0083.json" } ], "title": "Red Hat Security Advisory: mysql security update", "tracking": { "current_release_date": "2024-11-22T01:46:37+00:00", "generator": { "date": "2024-11-22T01:46:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0083", "initial_release_date": "2007-02-19T19:41:00+00:00", "revision_history": [ { "date": "2007-02-19T19:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-02-19T14:51:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:46:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product": { "name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_stack:1" } } }, { "category": "product_name", "name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product": { "name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_stack:1" } } } ], "category": "product_family", "name": "Red Hat Application Stack" }, { "branches": [ { "category": "product_version", "name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.30-1.el4s1.1?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "product": { "name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "product_id": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.30-1.el4s1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-server-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-server-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.30-1.el4s1.1?arch=i386" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.30-1.el4s1.1.i386", "product": { "name": "mysql-test-0:5.0.30-1.el4s1.1.i386", "product_id": "mysql-test-0:5.0.30-1.el4s1.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.30-1.el4s1.1?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-server-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-test-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)", "product_id": "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4AS-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-server-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-server-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386" }, "product_reference": "mysql-test-0:5.0.30-1.el4s1.1.i386", "relates_to_product_reference": "4ES-RHWAS" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)", "product_id": "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" }, "product_reference": "mysql-test-0:5.0.30-1.el4s1.1.x86_64", "relates_to_product_reference": "4ES-RHWAS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-0903", "discovery_date": "2006-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "194613" } ], "notes": [ { "category": "description", "text": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mysql log file obfuscation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0903" }, { "category": "external", "summary": "RHBZ#194613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=194613" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0903", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903" } ], "release_date": "2006-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Mysql log file obfuscation" }, { "cve": "CVE-2006-3081", "discovery_date": "2006-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618132" } ], "notes": [ { "category": "description", "text": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3081" }, { "category": "external", "summary": "RHBZ#1618132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618132" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081" } ], "release_date": "2006-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-4031", "discovery_date": "2006-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "202246" } ], "notes": [ { "category": "description", "text": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "MySQL improper permission revocation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4031" }, { "category": "external", "summary": "RHBZ#202246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=202246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4031", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031" } ], "release_date": "2005-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "MySQL improper permission revocation" }, { "cve": "CVE-2006-4226", "discovery_date": "2006-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "203428" } ], "notes": [ { "category": "description", "text": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql-server create database privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect Red Hat Enterprise Linux 2.1 or 3", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4226" }, { "category": "external", "summary": "RHBZ#203428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=203428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4226", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4226" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226" } ], "release_date": "2006-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mysql-server create database privilege escalation" }, { "cve": "CVE-2006-4227", "discovery_date": "2006-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "216427" } ], "notes": [ { "category": "description", "text": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql improper suid argument evaluation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4227" }, { "category": "external", "summary": "RHBZ#216427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=216427" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4227", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4227" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227" } ], "release_date": "2006-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-02-19T19:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386", "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0083" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mysql improper suid argument evaluation" } ] }
ghsa-87h3-8fr8-25m3
Vulnerability from github
Published
2022-05-01 07:05
Modified
2022-05-01 07:05
Details
mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
{ "affected": [], "aliases": [ "CVE-2006-3081" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-06-19T18:02:00Z", "severity": "MODERATE" }, "details": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.", "id": "GHSA-87h3-8fr8-25m3", "modified": "2022-05-01T07:05:31Z", "published": "2022-05-01T07:05:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" }, { "type": "WEB", "url": "https://usn.ubuntu.com/306-1" }, { "type": "WEB", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "type": "WEB", "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "type": "WEB", "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/19929" }, { "type": "WEB", "url": "http://secunia.com/advisories/20832" }, { "type": "WEB", "url": "http://secunia.com/advisories/20871" }, { "type": "WEB", "url": "http://secunia.com/advisories/24479" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1112" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/437145" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/437277" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/18439" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0930" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.