First published: Mon Aug 30 2010(Updated: )
A denial of service flaw was found in the way MySQL processed multiple parallel connections changing InnoDB storage engine configuration parameters (innodb_file_format and innodb_file_per_table) and simultaneously issuing data definition language (DDL) statemens. A remote, authenticated MySQL user could use this flaw to cause mysqld daemon abort (assertion failure). References: [1] <a href="http://secunia.com/advisories/41048/">http://secunia.com/advisories/41048/</a> [2] <a href="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html</a> Upstream bug report: [3] <a href="http://bugs.mysql.com/bug.php?id=55039">http://bugs.mysql.com/bug.php?id=55039</a>
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL Server | <=5.1.49 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-628660 is classified as a denial of service vulnerability.
REDHAT-BUG-628660 affects MySQL users by potentially causing a service disruption when certain configuration parameters are changed during simultaneous DDL operations.
To fix REDHAT-BUG-628660, it is recommended to upgrade to a MySQL version later than 5.1.49 that addresses this denial of service issue.
Authenticated remote MySQL users are affected by REDHAT-BUG-628660 due to the vulnerability in how MySQL processes certain operations.
MySQL versions up to and including 5.1.49 are impacted by REDHAT-BUG-628660.