First published: Sat Aug 28 2010(Updated: )
A denial of service was found in the way MySQL processed creation of temporary tables, when the InnoDB storage engine was used. A remote authenticated MySQL user could use this flaw to cause mysqld daemon abort (assertion failure). References: [1] <a href="http://secunia.com/advisories/41048/">http://secunia.com/advisories/41048/</a> [2] <a href="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html</a> Upstream bug report: [3] <a href="http://bugs.mysql.com/bug.php?id=54044">http://bugs.mysql.com/bug.php?id=54044</a> Note: This issue only causes a temporary denial of service, as the mysql daemon shipped with Red Hat Enterprise Linux 5 will be automatically restarted after the abort.
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL (MySQL-common) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-628192 is classified as a denial of service vulnerability.
REDHAT-BUG-628192 can lead to the MySQL daemon aborting when processing certain temporary table creations.
Remote authenticated MySQL users are affected by the REDHAT-BUG-628192 vulnerability.
Mitigation for REDHAT-BUG-628192 involves upgrading to a patched version of MySQL that addresses this denial of service flaw.
The vulnerability in REDHAT-BUG-628192 affects MySQL installations using the InnoDB storage engine.