OESA-2024-2072

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2072
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-2072.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-2072
Upstream
Published
2024-08-30T11:08:59Z
Modified
2025-08-12T05:38:17.191555Z
Summary
mysql security update
Details

The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of Oracle and/or its affiliates

Security Fix(es):

The public API function BIOnewNDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications.

The function receives a BIO from the caller, prepends a new BIOfasn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash.

This scenario occurs directly in the internal function B64writeASN1() which may cause BIOnewNDEF() to be called and will subsequently call BIOpop() on the BIO. This internal function is in turn called by the public API functions PEMwritebioASN1stream, PEMwritebioCMSstream, PEMwritebioPKCS7stream, SMIMEwriteASN1, SMIMEwriteCMS and SMIMEwrite_PKCS7.

Other public API functions that may be impacted by this include i2dASN1biostream, BIOnewCMS, BIOnewPKCS7, i2dCMSbiostream and i2dPKCS7bio_stream.

The OpenSSL cms and smime command line applications are similarly affected.

(CVE-2023-0215)

This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.

When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes.

If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there.

The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with. (CVE-2023-38545)

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21137)

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21159)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP1 / mysql

Package

Name
mysql
Purl
pkg:rpm/openEuler/mysql&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.38-1.oe2203sp1

Ecosystem specific

{
    "aarch64": [
        "mysql-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-common-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-config-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-debuginfo-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-debugsource-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-devel-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-errmsg-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-help-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-libs-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-server-8.0.38-1.oe2203sp1.aarch64.rpm",
        "mysql-test-8.0.38-1.oe2203sp1.aarch64.rpm"
    ],
    "x86_64": [
        "mysql-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-common-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-config-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-debuginfo-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-debugsource-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-devel-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-errmsg-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-help-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-libs-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-server-8.0.38-1.oe2203sp1.x86_64.rpm",
        "mysql-test-8.0.38-1.oe2203sp1.x86_64.rpm"
    ],
    "src": [
        "mysql-8.0.38-1.oe2203sp1.src.rpm"
    ]
}