Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0662 -- [RedHat] Important: mysql security update 31 August 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MySQL Publisher: Red Hat Operating System: Red Hat Enterprise Linux AS/ES/WS 4 Red Hat Enterprise Linux Desktop 4 Red Hat Enterprise Linux Desktop 5 Client Red Hat Enterprise Linux Desktop Workstation 5 Client Red Hat Enterprise Linux 5 Server Impact: Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2007-3780 Ref: ESB-2007.0527 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-0875.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: mysql security update Advisory ID: RHSA-2007:0875-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0875.html Issue date: 2007-08-30 Updated on: 2007-08-30 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-3780 - - --------------------------------------------------------------------- 1. Summary: Updated mysql packages that fix a security flaw are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. A flaw was discovered in MySQL's authentication protocol. It is possible for a remote unauthenticated attacker to send a specially crafted authentication request to the MySQL server causing it to crash. (CVE-2007-3780) All users of the MySQL server are advised to upgrade to these updated packages, which contain a backported patch which fixes this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 254108 - CVE-2007-3780 mysql malformed password crasher 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/mysql-4.1.20-2.RHEL4.1.0.1.src.rpm bf73ef5a83928ae0d4df5e493f9352c6 mysql-4.1.20-2.RHEL4.1.0.1.src.rpm i386: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm 90f871d896a8cea7ed7e283170dff773 mysql-bench-4.1.20-2.RHEL4.1.0.1.i386.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm 734ec276c3cd75bb5ccca0fa92b03216 mysql-devel-4.1.20-2.RHEL4.1.0.1.i386.rpm edf87b81ee5bba85922f32602af777a6 mysql-server-4.1.20-2.RHEL4.1.0.1.i386.rpm ia64: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm 45005918de77614c6cac34a5f05de7d6 mysql-4.1.20-2.RHEL4.1.0.1.ia64.rpm a50565bc6158157c1900b0299e72de28 mysql-bench-4.1.20-2.RHEL4.1.0.1.ia64.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm cdcc9584cb9275230a856e45a4e321fe mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.ia64.rpm fcbc25791972f6c35dd920507079cc56 mysql-devel-4.1.20-2.RHEL4.1.0.1.ia64.rpm 8450b60c250f548bd3a53b8cad7fc192 mysql-server-4.1.20-2.RHEL4.1.0.1.ia64.rpm ppc: e46405e7b51d2bf460d0f976bc889f45 mysql-4.1.20-2.RHEL4.1.0.1.ppc.rpm 416f5dcee34641049fa264ce86a3c748 mysql-4.1.20-2.RHEL4.1.0.1.ppc64.rpm 604842164bc03c909e2dc2fb8ce3dfaa mysql-bench-4.1.20-2.RHEL4.1.0.1.ppc.rpm 976eea272a7d295a5cfca3bdeed60f31 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.ppc.rpm f61165bd7a1410e7a451a45ea31618dd mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.ppc64.rpm d3576f4628614d0465b6fd5e2c23f7ba mysql-devel-4.1.20-2.RHEL4.1.0.1.ppc.rpm 055d1875fc2057fbe76da02a4cfce83e mysql-server-4.1.20-2.RHEL4.1.0.1.ppc.rpm s390: 963849fd650ae814a19b1f35df878ee9 mysql-4.1.20-2.RHEL4.1.0.1.s390.rpm fa25b5d80bfe55f202ed659b866bfcf2 mysql-bench-4.1.20-2.RHEL4.1.0.1.s390.rpm 3a259d3ddf418b16def066acb97b1c47 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.s390.rpm fdaf59e064049b7bd4472dc7db8827dd mysql-devel-4.1.20-2.RHEL4.1.0.1.s390.rpm 03481abe911d0b8f1883f18157d41e84 mysql-server-4.1.20-2.RHEL4.1.0.1.s390.rpm s390x: 963849fd650ae814a19b1f35df878ee9 mysql-4.1.20-2.RHEL4.1.0.1.s390.rpm c7620421b869aa9db61e0538cd5bb123 mysql-4.1.20-2.RHEL4.1.0.1.s390x.rpm 7f4dd6bd3544a95240c641865f1eef32 mysql-bench-4.1.20-2.RHEL4.1.0.1.s390x.rpm 3a259d3ddf418b16def066acb97b1c47 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.s390.rpm 6202e8f6bf64d7c3c8258c0e400ade26 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.s390x.rpm d94a615e92d10cbbe47ca3286e7e3c79 mysql-devel-4.1.20-2.RHEL4.1.0.1.s390x.rpm f4a7330baf56b26d5a8e5fa2ad8b20c0 mysql-server-4.1.20-2.RHEL4.1.0.1.s390x.rpm x86_64: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm a80c2ce8d91c81a3d8026c1bab012dac mysql-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 03705e8457d35c0ce05c3953e408c597 mysql-bench-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm 79f0ca34b5284acad3dac711b0a0551f mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 384af5faeeed97957d8f8e8af9ca6b21 mysql-devel-4.1.20-2.RHEL4.1.0.1.x86_64.rpm f7cd9e8bf14fd72a44f74085618bdf81 mysql-server-4.1.20-2.RHEL4.1.0.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/mysql-4.1.20-2.RHEL4.1.0.1.src.rpm bf73ef5a83928ae0d4df5e493f9352c6 mysql-4.1.20-2.RHEL4.1.0.1.src.rpm i386: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm 90f871d896a8cea7ed7e283170dff773 mysql-bench-4.1.20-2.RHEL4.1.0.1.i386.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm 734ec276c3cd75bb5ccca0fa92b03216 mysql-devel-4.1.20-2.RHEL4.1.0.1.i386.rpm edf87b81ee5bba85922f32602af777a6 mysql-server-4.1.20-2.RHEL4.1.0.1.i386.rpm x86_64: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm a80c2ce8d91c81a3d8026c1bab012dac mysql-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 03705e8457d35c0ce05c3953e408c597 mysql-bench-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm 79f0ca34b5284acad3dac711b0a0551f mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 384af5faeeed97957d8f8e8af9ca6b21 mysql-devel-4.1.20-2.RHEL4.1.0.1.x86_64.rpm f7cd9e8bf14fd72a44f74085618bdf81 mysql-server-4.1.20-2.RHEL4.1.0.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/mysql-4.1.20-2.RHEL4.1.0.1.src.rpm bf73ef5a83928ae0d4df5e493f9352c6 mysql-4.1.20-2.RHEL4.1.0.1.src.rpm i386: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm 90f871d896a8cea7ed7e283170dff773 mysql-bench-4.1.20-2.RHEL4.1.0.1.i386.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm 734ec276c3cd75bb5ccca0fa92b03216 mysql-devel-4.1.20-2.RHEL4.1.0.1.i386.rpm edf87b81ee5bba85922f32602af777a6 mysql-server-4.1.20-2.RHEL4.1.0.1.i386.rpm ia64: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm 45005918de77614c6cac34a5f05de7d6 mysql-4.1.20-2.RHEL4.1.0.1.ia64.rpm a50565bc6158157c1900b0299e72de28 mysql-bench-4.1.20-2.RHEL4.1.0.1.ia64.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm cdcc9584cb9275230a856e45a4e321fe mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.ia64.rpm fcbc25791972f6c35dd920507079cc56 mysql-devel-4.1.20-2.RHEL4.1.0.1.ia64.rpm 8450b60c250f548bd3a53b8cad7fc192 mysql-server-4.1.20-2.RHEL4.1.0.1.ia64.rpm x86_64: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm a80c2ce8d91c81a3d8026c1bab012dac mysql-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 03705e8457d35c0ce05c3953e408c597 mysql-bench-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm 79f0ca34b5284acad3dac711b0a0551f mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 384af5faeeed97957d8f8e8af9ca6b21 mysql-devel-4.1.20-2.RHEL4.1.0.1.x86_64.rpm f7cd9e8bf14fd72a44f74085618bdf81 mysql-server-4.1.20-2.RHEL4.1.0.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/mysql-4.1.20-2.RHEL4.1.0.1.src.rpm bf73ef5a83928ae0d4df5e493f9352c6 mysql-4.1.20-2.RHEL4.1.0.1.src.rpm i386: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm 90f871d896a8cea7ed7e283170dff773 mysql-bench-4.1.20-2.RHEL4.1.0.1.i386.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm 734ec276c3cd75bb5ccca0fa92b03216 mysql-devel-4.1.20-2.RHEL4.1.0.1.i386.rpm edf87b81ee5bba85922f32602af777a6 mysql-server-4.1.20-2.RHEL4.1.0.1.i386.rpm ia64: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm 45005918de77614c6cac34a5f05de7d6 mysql-4.1.20-2.RHEL4.1.0.1.ia64.rpm a50565bc6158157c1900b0299e72de28 mysql-bench-4.1.20-2.RHEL4.1.0.1.ia64.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm cdcc9584cb9275230a856e45a4e321fe mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.ia64.rpm fcbc25791972f6c35dd920507079cc56 mysql-devel-4.1.20-2.RHEL4.1.0.1.ia64.rpm 8450b60c250f548bd3a53b8cad7fc192 mysql-server-4.1.20-2.RHEL4.1.0.1.ia64.rpm x86_64: 0191fdd6db1dd780d6c9bb864c9ed071 mysql-4.1.20-2.RHEL4.1.0.1.i386.rpm a80c2ce8d91c81a3d8026c1bab012dac mysql-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 03705e8457d35c0ce05c3953e408c597 mysql-bench-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 19e9c78362f7eabd0b27e2f3cd3ef0d2 mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.i386.rpm 79f0ca34b5284acad3dac711b0a0551f mysql-debuginfo-4.1.20-2.RHEL4.1.0.1.x86_64.rpm 384af5faeeed97957d8f8e8af9ca6b21 mysql-devel-4.1.20-2.RHEL4.1.0.1.x86_64.rpm f7cd9e8bf14fd72a44f74085618bdf81 mysql-server-4.1.20-2.RHEL4.1.0.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/mysql-5.0.22-2.1.0.1.src.rpm d49bb6674b342b792597a1cca27e43b1 mysql-5.0.22-2.1.0.1.src.rpm i386: d63b0a191afbde6fd4790b56d36c720e mysql-5.0.22-2.1.0.1.i386.rpm 55ac25159dd33d42271ad92a94551f23 mysql-debuginfo-5.0.22-2.1.0.1.i386.rpm x86_64: d63b0a191afbde6fd4790b56d36c720e mysql-5.0.22-2.1.0.1.i386.rpm 54c816ee45c5d905a0dbe2ddc12bb68f mysql-5.0.22-2.1.0.1.x86_64.rpm 55ac25159dd33d42271ad92a94551f23 mysql-debuginfo-5.0.22-2.1.0.1.i386.rpm 399640b5a6f70f26bdab38b7be8271d9 mysql-debuginfo-5.0.22-2.1.0.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/mysql-5.0.22-2.1.0.1.src.rpm d49bb6674b342b792597a1cca27e43b1 mysql-5.0.22-2.1.0.1.src.rpm i386: 04f35fd3b93ac963ddc2a1bd716f2489 mysql-bench-5.0.22-2.1.0.1.i386.rpm 55ac25159dd33d42271ad92a94551f23 mysql-debuginfo-5.0.22-2.1.0.1.i386.rpm 8d05e37bef9ed580426c839c9fa9767d mysql-devel-5.0.22-2.1.0.1.i386.rpm 63d88d2bcf90b71b6c5fca71894e75d0 mysql-server-5.0.22-2.1.0.1.i386.rpm 141dec71a068b8a44e6fbb0392b8e15f mysql-test-5.0.22-2.1.0.1.i386.rpm x86_64: 34c56af302cd4677e634969184371d11 mysql-bench-5.0.22-2.1.0.1.x86_64.rpm 55ac25159dd33d42271ad92a94551f23 mysql-debuginfo-5.0.22-2.1.0.1.i386.rpm 399640b5a6f70f26bdab38b7be8271d9 mysql-debuginfo-5.0.22-2.1.0.1.x86_64.rpm 8d05e37bef9ed580426c839c9fa9767d mysql-devel-5.0.22-2.1.0.1.i386.rpm 30804cc400cf61e73d40ca97b97a48ea mysql-devel-5.0.22-2.1.0.1.x86_64.rpm ed2bc5b728d54c5853b7bd156aef33a7 mysql-server-5.0.22-2.1.0.1.x86_64.rpm bd2a62c8e6b2ba9cdf2fcae8c1a19b14 mysql-test-5.0.22-2.1.0.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/mysql-5.0.22-2.1.0.1.src.rpm d49bb6674b342b792597a1cca27e43b1 mysql-5.0.22-2.1.0.1.src.rpm i386: d63b0a191afbde6fd4790b56d36c720e mysql-5.0.22-2.1.0.1.i386.rpm 04f35fd3b93ac963ddc2a1bd716f2489 mysql-bench-5.0.22-2.1.0.1.i386.rpm 55ac25159dd33d42271ad92a94551f23 mysql-debuginfo-5.0.22-2.1.0.1.i386.rpm 8d05e37bef9ed580426c839c9fa9767d mysql-devel-5.0.22-2.1.0.1.i386.rpm 63d88d2bcf90b71b6c5fca71894e75d0 mysql-server-5.0.22-2.1.0.1.i386.rpm 141dec71a068b8a44e6fbb0392b8e15f mysql-test-5.0.22-2.1.0.1.i386.rpm ia64: d63b0a191afbde6fd4790b56d36c720e mysql-5.0.22-2.1.0.1.i386.rpm 6d48c230c4bb593c1dcba6e59c7dcdc4 mysql-5.0.22-2.1.0.1.ia64.rpm b8d463b9e102a4b606fa98d2107d7241 mysql-bench-5.0.22-2.1.0.1.ia64.rpm 55ac25159dd33d42271ad92a94551f23 mysql-debuginfo-5.0.22-2.1.0.1.i386.rpm 7908efd01405e305f7d7e432b9aa4f51 mysql-debuginfo-5.0.22-2.1.0.1.ia64.rpm dcda1776977e420d7eb62948477158b4 mysql-devel-5.0.22-2.1.0.1.ia64.rpm 1b46cc74f141e384295b9fc6347eac78 mysql-server-5.0.22-2.1.0.1.ia64.rpm f01e36b6679370142181fb8540f87786 mysql-test-5.0.22-2.1.0.1.ia64.rpm ppc: 006e3713690c9865fc39f51f4294a706 mysql-5.0.22-2.1.0.1.ppc.rpm 0d20f1853ff2fd8853bd189da3b247b5 mysql-5.0.22-2.1.0.1.ppc64.rpm e2770cbea01c318cb3c79f137f3e4bdf mysql-bench-5.0.22-2.1.0.1.ppc.rpm c72e1693ae082be7ff7edc9cbb31ecb8 mysql-debuginfo-5.0.22-2.1.0.1.ppc.rpm 17f6edab5d3376ecfbfa53035df1e01c mysql-debuginfo-5.0.22-2.1.0.1.ppc64.rpm 55f96a77cd5012bfe1dbb9416074f698 mysql-devel-5.0.22-2.1.0.1.ppc.rpm 380b6fa5af66edf427652e521a6dfbc1 mysql-devel-5.0.22-2.1.0.1.ppc64.rpm 202a313ace6bcf75e25a8869a9f31fe8 mysql-server-5.0.22-2.1.0.1.ppc.rpm b374f5278d806e15854813600cb87e5a mysql-test-5.0.22-2.1.0.1.ppc.rpm s390x: 44fe192826c75a98cf07ae3bb86f3b27 mysql-5.0.22-2.1.0.1.s390.rpm c0ff33805d8652a7f247a027409ff489 mysql-5.0.22-2.1.0.1.s390x.rpm be3d5f933cd713af65006951ab322bee mysql-bench-5.0.22-2.1.0.1.s390x.rpm 2c904cd8206dd46e6fbb59fd435d1e4b mysql-debuginfo-5.0.22-2.1.0.1.s390.rpm d7e1610d66f600eb87be8d756fb65067 mysql-debuginfo-5.0.22-2.1.0.1.s390x.rpm 7098965c92db8ef97dca519d9c8a87d4 mysql-devel-5.0.22-2.1.0.1.s390.rpm 8bcfdbe3b3527a88b33ab597399f1bdb mysql-devel-5.0.22-2.1.0.1.s390x.rpm 4a62233226170ff56df8dc5fcaa7da12 mysql-server-5.0.22-2.1.0.1.s390x.rpm 61be58fe063aa337926546e4054ad45c mysql-test-5.0.22-2.1.0.1.s390x.rpm x86_64: d63b0a191afbde6fd4790b56d36c720e mysql-5.0.22-2.1.0.1.i386.rpm 54c816ee45c5d905a0dbe2ddc12bb68f mysql-5.0.22-2.1.0.1.x86_64.rpm 34c56af302cd4677e634969184371d11 mysql-bench-5.0.22-2.1.0.1.x86_64.rpm 55ac25159dd33d42271ad92a94551f23 mysql-debuginfo-5.0.22-2.1.0.1.i386.rpm 399640b5a6f70f26bdab38b7be8271d9 mysql-debuginfo-5.0.22-2.1.0.1.x86_64.rpm 8d05e37bef9ed580426c839c9fa9767d mysql-devel-5.0.22-2.1.0.1.i386.rpm 30804cc400cf61e73d40ca97b97a48ea mysql-devel-5.0.22-2.1.0.1.x86_64.rpm ed2bc5b728d54c5853b7bd156aef33a7 mysql-server-5.0.22-2.1.0.1.x86_64.rpm bd2a62c8e6b2ba9cdf2fcae8c1a19b14 mysql-test-5.0.22-2.1.0.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3780 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFG1sgJXlSAg2UNWIIRAsNnAJoCuo4Zn5JLubmbtRKvoCbhRL4oDwCgtrvW rA8KHDQYWU1nezssJpxK8Vk= =n3I+ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRteZUih9+71yA2DNAQIKjAP7BdJnlyMf/lk3ZK1NuqI1/yUPHpFzHgld FUC0RSwJpvNZq1R/xeUJiMPKNz/+qOx8xTfjVswC87ayTYYr5T2dDKh4y0Nm7td1 QodGucR224a5BXpQ7s1jirmI9+R4XNAm11nT1H2EnQC6yKK96KNszDt0BCyoyPAi on/nJ/jXknY= =fcK9 -----END PGP SIGNATURE-----