Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for mysql RHSA-2012:0874-04
Summary:The remote host is missing an update for the 'mysql'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'mysql'
package(s) announced via the referenced advisory.

Vulnerability Insight:
MySQL is a multi-user, multi-threaded SQL database server. It consists of
the MySQL server daemon (mysqld) and many client programs and libraries.

A flaw was found in the way MySQL processed HANDLER READ NEXT statements
after deleting a record. A remote, authenticated attacker could use this
flaw to provide such requests, causing mysqld to crash. This issue only
caused a temporary denial of service, as mysqld was automatically restarted
after the crash. (CVE-2012-2102)

This update also adds the following enhancement:

* The InnoDB storage engine is built-in for all architectures. This update
adds InnoDB Plugin, the InnoDB storage engine as a plug-in for the 32-bit
x86, AMD64, and Intel 64 architectures. The plug-in offers additional
features and better performance than when using the built-in InnoDB storage
engine. Refer to the MySQL documentation, linked to in the References
section, for information about enabling the plug-in. (BZ#740224)

All MySQL users should upgrade to these updated packages, which add this
enhancement and contain a backported patch to correct this issue. After
installing this update, the MySQL server daemon (mysqld) will be restarted

Affected Software/OS:
mysql on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-2102
BugTraq ID: 52931
CopyrightCopyright (c) 2012 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.