The CentOS team has been looking at the issue called out in these stories:
http://threatpost.com/en_us/blogs/trivial-password-flaw-leaves-mysql-databases-exposed-061112
http://arstechnica.com/information-technology/2012/06/security-flaw-in-mysql-mariadb-allows-access-with-any-password-just-keep-submitting-it/
http://www.net-security.org/secworld.php?id=13076
According to the upstream provider EL4, EL5 and EL6 are not impacted by
the above issue:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2122
Thanks,
Johnny Hughes
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 262 bytes
Desc: OpenPGP digital signature
URL:
<http://lists.centos.org/pipermail/centos/attachments/20120611/c1970c8d/attachment-0004.sig>