RedHat: RHSA-2017-2886:01 Important: rh-mysql57-mysql security and bug fix
Summary
MySQL is a multi-user, multi-threaded SQL database server. It consists of
the MySQL server daemon, mysqld, and many client programs.
The following packages have been upgraded to a later upstream version:
rh-mysql57-mysql (5.7.19).
Security Fix(es):
* An integer overflow flaw leading to a buffer overflow was found in the
way MySQL parsed connection handshake packets. An unauthenticated remote
attacker with access to the MySQL port could use this flaw to crash the
mysqld daemon. (CVE-2017-3599)
* It was discovered that the mysql and mysqldump tools did not correctly
handle database and table names containing newline characters. A database
user with privileges to create databases or tables could cause the mysql
command to execute arbitrary shell or SQL commands while restoring database
backup created using the mysqldump tool. (CVE-2016-5483, CVE-2017-3600)
* It was discovered that the mysqld_safe script honored the ledir option
value set in a MySQL configuration file. A user able to modify one of the
MySQL configuration files could use this flaw to escalate their privileges
to root. (CVE-2017-3291)
* Multiple flaws were found in the way the mysqld_safe script handled
creation of error log file. The mysql operating system user could use these
flaws to escalate their privileges to root. (CVE-2017-3312)
* This update fixes several vulnerabilities in the MySQL database server.
Information about these flaws can be found on the Oracle Critical Patch
Update Advisory pages listed in the References section. (CVE-2016-8327,
CVE-2017-3238, CVE-2017-3244, CVE-2017-3251, CVE-2017-3256, CVE-2017-3257,
CVE-2017-3258, CVE-2017-3273, CVE-2017-3308, CVE-2017-3309, CVE-2017-3313,
CVE-2017-3317, CVE-2017-3318, CVE-2017-3319, CVE-2017-3320, CVE-2017-3331,
CVE-2017-3450, CVE-2017-3453, CVE-2017-3454, CVE-2017-3455, CVE-2017-3456,
CVE-2017-3457, CVE-2017-3458, CVE-2017-3459, CVE-2017-3460, CVE-2017-3461,
CVE-2017-3462, CVE-2017-3463, CVE-2017-3464, CVE-2017-3465, CVE-2017-3467,
CVE-2017-3468, CVE-2017-3529, CVE-2017-3633, CVE-2017-3634, CVE-2017-3637,
CVE-2017-3638, CVE-2017-3639, CVE-2017-3640, CVE-2017-3641, CVE-2017-3642,
CVE-2017-3643, CVE-2017-3644, CVE-2017-3645, CVE-2017-3646, CVE-2017-3647,
CVE-2017-3648, CVE-2017-3649, CVE-2017-3650, CVE-2017-3651, CVE-2017-3652,
CVE-2017-3653)
Bug Fix(es):
* Prior to this update, the scl macros were not set for the
rh-mysql57-mysqld@.service file, which consequently made the service file
unusable. This bug has been fixed, and rh-mysql57-mysqld@.service now works
as expected. (BZ#1452511)
* Previously, the md5() function was blocked by MySQL in FIPS mode because
the MD5 hash algorithm is considered insecure. Consequently, the mysqld
daemon failed with error messages when FIPS mode was enabled. With this
update, md5() is allowed in FIPS mode for non-security operations. Note
that users are able to use md5() for security purposes but such usage is
not supported by Red Hat. (BZ#1452514)
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the MySQL server daemon (mysqld) will be
restarted automatically.
References
https://access.redhat.com/security/cve/CVE-2016-5483 https://access.redhat.com/security/cve/CVE-2016-8327 https://access.redhat.com/security/cve/CVE-2017-3238 https://access.redhat.com/security/cve/CVE-2017-3244 https://access.redhat.com/security/cve/CVE-2017-3251 https://access.redhat.com/security/cve/CVE-2017-3256 https://access.redhat.com/security/cve/CVE-2017-3257 https://access.redhat.com/security/cve/CVE-2017-3258 https://access.redhat.com/security/cve/CVE-2017-3273 https://access.redhat.com/security/cve/CVE-2017-3291 https://access.redhat.com/security/cve/CVE-2017-3308 https://access.redhat.com/security/cve/CVE-2017-3309 https://access.redhat.com/security/cve/CVE-2017-3312 https://access.redhat.com/security/cve/CVE-2017-3313 https://access.redhat.com/security/cve/CVE-2017-3317 https://access.redhat.com/security/cve/CVE-2017-3318 https://access.redhat.com/security/cve/CVE-2017-3319 https://access.redhat.com/security/cve/CVE-2017-3320 https://access.redhat.com/security/cve/CVE-2017-3331 https://access.redhat.com/security/cve/CVE-2017-3450 https://access.redhat.com/security/cve/CVE-2017-3453 https://access.redhat.com/security/cve/CVE-2017-3454 https://access.redhat.com/security/cve/CVE-2017-3455 https://access.redhat.com/security/cve/CVE-2017-3456 https://access.redhat.com/security/cve/CVE-2017-3457 https://access.redhat.com/security/cve/CVE-2017-3458 https://access.redhat.com/security/cve/CVE-2017-3459 https://access.redhat.com/security/cve/CVE-2017-3460 https://access.redhat.com/security/cve/CVE-2017-3461 https://access.redhat.com/security/cve/CVE-2017-3462 https://access.redhat.com/security/cve/CVE-2017-3463 https://access.redhat.com/security/cve/CVE-2017-3464 https://access.redhat.com/security/cve/CVE-2017-3465 https://access.redhat.com/security/cve/CVE-2017-3467 https://access.redhat.com/security/cve/CVE-2017-3468 https://access.redhat.com/security/cve/CVE-2017-3529 https://access.redhat.com/security/cve/CVE-2017-3599 https://access.redhat.com/security/cve/CVE-2017-3600 https://access.redhat.com/security/cve/CVE-2017-3633 https://access.redhat.com/security/cve/CVE-2017-3634 https://access.redhat.com/security/cve/CVE-2017-3637 https://access.redhat.com/security/cve/CVE-2017-3638 https://access.redhat.com/security/cve/CVE-2017-3639 https://access.redhat.com/security/cve/CVE-2017-3640 https://access.redhat.com/security/cve/CVE-2017-3641 https://access.redhat.com/security/cve/CVE-2017-3642 https://access.redhat.com/security/cve/CVE-2017-3643 https://access.redhat.com/security/cve/CVE-2017-3644 https://access.redhat.com/security/cve/CVE-2017-3645 https://access.redhat.com/security/cve/CVE-2017-3646 https://access.redhat.com/security/cve/CVE-2017-3647 https://access.redhat.com/security/cve/CVE-2017-3648 https://access.redhat.com/security/cve/CVE-2017-3649 https://access.redhat.com/security/cve/CVE-2017-3650 https://access.redhat.com/security/cve/CVE-2017-3651 https://access.redhat.com/security/cve/CVE-2017-3652 https://access.redhat.com/security/cve/CVE-2017-3653 https://access.redhat.com/security/updates/classification/#important http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-17.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-18.html https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-19.html
Package List
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
rh-mysql57-mysql-5.7.19-6.el6.src.rpm
x86_64:
rh-mysql57-mysql-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-common-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-config-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-debuginfo-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-devel-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-errmsg-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-server-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-test-5.7.19-6.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):
Source:
rh-mysql57-mysql-5.7.19-6.el6.src.rpm
x86_64:
rh-mysql57-mysql-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-common-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-config-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-debuginfo-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-devel-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-errmsg-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-server-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-test-5.7.19-6.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
rh-mysql57-mysql-5.7.19-6.el6.src.rpm
x86_64:
rh-mysql57-mysql-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-common-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-config-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-debuginfo-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-devel-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-errmsg-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-server-5.7.19-6.el6.x86_64.rpm
rh-mysql57-mysql-test-5.7.19-6.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-mysql57-mysql-5.7.19-6.el7.src.rpm
x86_64:
rh-mysql57-mysql-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-common-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-config-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-debuginfo-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-devel-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-errmsg-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-server-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-test-5.7.19-6.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3):
Source:
rh-mysql57-mysql-5.7.19-6.el7.src.rpm
x86_64:
rh-mysql57-mysql-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-common-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-config-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-debuginfo-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-devel-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-errmsg-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-server-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-test-5.7.19-6.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-mysql57-mysql-5.7.19-6.el7.src.rpm
x86_64:
rh-mysql57-mysql-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-common-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-config-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-debuginfo-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-devel-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-errmsg-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-server-5.7.19-6.el7.x86_64.rpm
rh-mysql57-mysql-test-5.7.19-6.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for rh-mysql57-mysql is now available for Red Hat SoftwareCollections.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Bugs Fixed
1414133 - CVE-2017-3312 mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017)
1414337 - CVE-2016-8327 mysql: Server: Replication unspecified vulnerability (CPU Jan 2017)
1414338 - CVE-2017-3238 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017)
1414342 - CVE-2017-3244 mysql: Server: DML unspecified vulnerability (CPU Jan 2017)
1414343 - CVE-2017-3251 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017)
1414345 - CVE-2017-3256 mysql: Server: Replication unspecified vulnerability (CPU Jan 2017)
1414350 - CVE-2017-3257 mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017)
1414351 - CVE-2017-3258 mysql: Server: DDL unspecified vulnerability (CPU Jan 2017)
1414352 - CVE-2017-3273 mysql: Server: DDL unspecified vulnerability (CPU Jan 2017)
1414353 - CVE-2017-3313 mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017)
1414355 - CVE-2017-3317 mysql: Logging unspecified vulnerability (CPU Jan 2017)
1414357 - CVE-2017-3318 mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017)
1414358 - CVE-2017-3319 mysql: Server: X Plugin unspecified vulnerability (CPU Jan 2017)
1414360 - CVE-2017-3320 mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2017)
1414429 - CVE-2017-3291 mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017)
1433010 - CVE-2016-5483 CVE-2017-3600 mariadb, mysql: Incorrect input validation allowing code execution via mysqldump
1443358 - CVE-2017-3308 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
1443359 - CVE-2017-3309 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
1443362 - CVE-2017-3331 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
1443363 - CVE-2017-3450 mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017)
1443365 - CVE-2017-3453 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
1443366 - CVE-2017-3454 mysql: Server: InnoDB unspecified vulnerability (CPU Apr 2017)
1443368 - CVE-2017-3455 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
1443369 - CVE-2017-3456 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
1443371 - CVE-2017-3457 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
1443372 - CVE-2017-3458 mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
1443374 - CVE-2017-3459 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
1443375 - CVE-2017-3460 mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2017)
1443376 - CVE-2017-3461 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
1443377 - CVE-2017-3462 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
1443378 - CVE-2017-3463 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
1443379 - CVE-2017-3464 mysql: Server: DDL unspecified vulnerability (CPU Apr 2017)
1443380 - CVE-2017-3465 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
1443382 - CVE-2017-3467 mysql: Server: C API unspecified vulnerability (CPU Apr 2017)
1443385 - CVE-2017-3468 mysql: Server: Security: Encryption unspecified vulnerability (CPU Apr 2017)
1443386 - CVE-2017-3599 mysql: integer underflow in get_56_lenc_string() leading to DoS (CPU Apr 2017)
1472682 - CVE-2017-3529 mysql: Server: UDF unspecified vulnerability (CPU Jul 2017)
1472683 - CVE-2017-3633 mysql: Server: Memcached unspecified vulnerability (CPU Jul 2017)
1472684 - CVE-2017-3634 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
1472687 - CVE-2017-3637 mysql: X Plugin unspecified vulnerability (CPU Jul 2017)
1472688 - CVE-2017-3638 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017)
1472689 - CVE-2017-3639 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
1472692 - CVE-2017-3640 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
1472693 - CVE-2017-3641 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
1472695 - CVE-2017-3642 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017)
1472697 - CVE-2017-3643 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
1472698 - CVE-2017-3644 mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
1472700 - CVE-2017-3645 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017)
1472701 - CVE-2017-3646 mysql: X Plugin unspecified vulnerability (CPU Jul 2017)
1472703 - CVE-2017-3647 mysql: Server: Replication unspecified vulnerability (CPU Jul 2017)
1472704 - CVE-2017-3648 mysql: Server: Charsets unspecified vulnerability (CPU Jul 2017)
1472705 - CVE-2017-3649 mysql: Server: Replication unspecified vulnerability (CPU Jul 2017)
1472706 - CVE-2017-3650 mysql: C API unspecified vulnerability (CPU Jul 2017)
1472708 - CVE-2017-3651 mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
1472710 - CVE-2017-3652 mysql: Server: DDL unspecified vulnerability (CPU Jul 2017)
1472711 - CVE-2017-3653 mysql: Server: DDL unspecified vulnerability (CPU Jul 2017)