CVE-2012-2122

NameCVE-2012-2122
Descriptionsql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2496-1
Debian Bugs677018

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mysql-5.1sourcesqueeze5.1.63-0+squeeze1DSA-2496-1
mysql-5.1source(unstable)(unfixed)677018
mysql-5.5source(unstable)5.5.24+dfsg-1

Notes

https://www.secmaniac.com/blog/2012/06/11/massive-mysql-authentication-bypass-exploit/
http://seclists.org/oss-sec/2012/q2/493
Issue only triggered with specific optimisation in glibc enabled; no builds in Debian known to be affected.
Fixed versions indicate application of upstream patch which prevents issue regardless of opt.settings.

Search for package or bug name: Reporting problems