USN-950-1: MySQL vulnerabilities

Ubuntu Security Notice USN-950-1

9th June, 2010

mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Software description

  • mysql-dfsg-5.0
  • mysql-dfsg-5.1


It was discovered that MySQL did not check privileges before uninstalling
plugins. An authenticated user could uninstall arbitrary plugins, bypassing
intended restrictions. This issue only affected Ubuntu 9.10 and 10.04 LTS.

It was discovered that MySQL could be made to delete another user's data
and index files. An authenticated user could use symlinks combined with the
DROP TABLE command to possibly bypass privilege checks. (CVE-2010-1626)

It was discovered that MySQL incorrectly validated the table name argument
of the COM_FIELD_LIST command. An authenticated user could use a specially-
crafted table name to bypass privilege checks and possibly access other
tables. (CVE-2010-1848)

Eric Day discovered that MySQL incorrectly handled certain network packets.
A remote attacker could exploit this flaw and cause the server to consume
all available resources, resulting in a denial of service. (CVE-2010-1849)

It was discovered that MySQL performed incorrect bounds checking on the
table name argument of the COM_FIELD_LIST command. An authenticated user
could use a specially-crafted table name to cause a denial of service or
possibly execute arbitrary code. The default compiler options for affected
releases should reduce the vulnerability to a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 10.04 LTS:
mysql-server-5.1 5.1.41-3ubuntu12.3
Ubuntu 9.10:
mysql-server-5.1 5.1.37-1ubuntu5.4
Ubuntu 9.04:
mysql-server-5.0 5.1.30really5.0.75-0ubuntu10.5
Ubuntu 8.04 LTS:
mysql-server-5.0 5.0.51a-3ubuntu5.7
Ubuntu 6.06 LTS:
mysql-server-5.0 5.0.22-0ubuntu6.06.14

To update your system, please follow these instructions:

In general, a standard system update will make all the necessary changes.


CVE-2010-1621, CVE-2010-1626, CVE-2010-1848, CVE-2010-1849, CVE-2010-1850