diff mbox

[1/1] mariadb: security bump to version 10.1.23

Message ID 20170508153716.16809-1-bluemrp9@gmail.com
State Accepted
Commit e6213e8ee68cbb637997ff02abe7945ec1cc168c
Headers show

Commit Message

Ryan Coe May 8, 2017, 3:37 p.m. UTC
Fixes:

CVE-2017-3302 - Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and
5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29,
10.1.x through 10.1.21, and 10.2.x through 10.2.3.

CVE-2017-3313 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: MyISAM). Supported versions that are affected are
5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to
exploit vulnerability allows low privileged attacker with logon to the
infrastructure where MySQL Server executes to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized access
to critical data or complete access to all MySQL Server accessible data.

CVE-2017-3308 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: DML). Supported versions that are affected are 5.5.54
and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable"
vulnerability allows low privileged attacker with network access via
multiple protocols to compromise MySQL Server. While the vulnerability is
in MySQL Server, attacks may significantly impact additional products.
Successful attacks of this vulnerability can result in unauthorized
ability to cause a hang or frequently repeatable crash (complete DOS) of
MySQL Server.

CVE-2017-3309 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Optimizer). Supported versions that are affected are
5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily
"exploitable" vulnerability allows low privileged attacker with network
access via multiple protocols to compromise MySQL Server. While the
vulnerability is in MySQL Server, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result
in unauthorized ability to cause a hang or frequently repeatable crash
(complete DOS) of MySQL Server.

CVE-2017-3453 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Optimizer). Supported versions that are affected are
5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily
"exploitable" vulnerability allows low privileged attacker with network
access via multiple protocols to compromise MySQL Server. Successful attacks
of this vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS) of MySQL Server.

CVE-2017-3456 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: DML). Supported versions that are affected are 5.5.54
and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable"
vulnerability allows high privileged attacker with network access via
multiple protocols to compromise MySQL Server. Successful attacks of this
vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS) of MySQL Server.

CVE-2017-3464 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: DDL). Supported versions that are affected are 5.5.54
and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable"
vulnerability allows low privileged attacker with network access via
multiple protocols to compromise MySQL Server. Successful attacks of this
vulnerability can result in unauthorized update, insert or delete access to
some of MySQL Server accessible data.

And a number of important, but non-security related fixes:

MDEV-12602: Fixed some race conditions in InnoDB encryption

MariaDB Backup alpha introduced

Galera wsrep library updated to 25.3.20

For details, see the release notes:
https://mariadb.com/kb/en/mariadb/mariadb-10123-release-notes/

Signed-off-by: Ryan Coe <bluemrp9@gmail.com>
---
 package/mariadb/mariadb.hash | 4 ++--
 package/mariadb/mariadb.mk   | 2 +-
 2 files changed, 3 insertions(+), 3 deletions(-)

Comments

Peter Korsgaard May 8, 2017, 7:28 p.m. UTC | #1
>>>>> "Ryan" == Ryan Coe <bluemrp9@gmail.com> writes:

 > Fixes:
 > CVE-2017-3302 - Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and
 > 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29,
 > 10.1.x through 10.1.21, and 10.2.x through 10.2.3.

[snip]

 > -MARIADB_VERSION = 10.1.22
 > +MARIADB_VERSION = 10.1.23
 >  MARIADB_SITE = https://downloads.mariadb.org/interstitial/mariadb-$(MARIADB_VERSION)/source
 >  MARIADB_LICENSE = GPL-2.0 (server), GPL-2.0 with FLOSS exception (GPL
 > client library), LGPL-2.0 (LGPL client library)
 >  MARIADB_LICENSE_FILES = README COPYING COPYING.LESSER

Thanks, I (obviously) want to apply this, but something odd is going on
with the licensing. COPYING.LESSER has been removed by this commit:

https://github.com/MariaDB/server/commit/577915def8

But the client library IS listed as being LGPL:

https://mariadb.com/kb/en/mariadb/mariadb-connector-c/

And same for the "old" one:

https://mariadb.com/kb/en/mariadb/lgpl-mysql-client-library-32358/

Grepping around in the 10.1.23 tarball, I don't see a lot of references
to Lesser og LGPL.

Now, I know next to nothing about mariadb. Do you have any idea what is
going on here?
Ryan Coe May 12, 2017, 1:44 p.m. UTC | #2
Peter, All,


On 5/8/2017 12:28 PM, Peter Korsgaard wrote:
>>>>>> "Ryan" == Ryan Coe <bluemrp9@gmail.com> writes:
>   > Fixes:
>   > CVE-2017-3302 - Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and
>   > 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29,
>   > 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
>
> [snip]
>
>   > -MARIADB_VERSION = 10.1.22
>   > +MARIADB_VERSION = 10.1.23
>   >  MARIADB_SITE = https://downloads.mariadb.org/interstitial/mariadb-$(MARIADB_VERSION)/source
>   >  MARIADB_LICENSE = GPL-2.0 (server), GPL-2.0 with FLOSS exception (GPL
>   > client library), LGPL-2.0 (LGPL client library)
>   >  MARIADB_LICENSE_FILES = README COPYING COPYING.LESSER
>
> Thanks, I (obviously) want to apply this, but something odd is going on
> with the licensing. COPYING.LESSER has been removed by this commit:
>
> https://github.com/MariaDB/server/commit/577915def8
>
> But the client library IS listed as being LGPL:
>
> https://mariadb.com/kb/en/mariadb/mariadb-connector-c/
>
> And same for the "old" one:
>
> https://mariadb.com/kb/en/mariadb/lgpl-mysql-client-library-32358/
>
> Grepping around in the 10.1.23 tarball, I don't see a lot of references
> to Lesser og LGPL.
>
> Now, I know next to nothing about mariadb. Do you have any idea what is
> going on here?
>
I am really not sure what is going on there.
Peter Korsgaard May 15, 2017, 1:51 p.m. UTC | #3
>>>>> "Ryan" == Ryan Coe <bluemrp9@gmail.com> writes:

Hi,

 >> Thanks, I (obviously) want to apply this, but something odd is going on
 >> with the licensing. COPYING.LESSER has been removed by this commit:
 >> 
 >> https://github.com/MariaDB/server/commit/577915def8
 >> 
 >> But the client library IS listed as being LGPL:
 >> 
 >> https://mariadb.com/kb/en/mariadb/mariadb-connector-c/
 >> 
 >> And same for the "old" one:
 >> 
 >> https://mariadb.com/kb/en/mariadb/lgpl-mysql-client-library-32358/
 >> 
 >> Grepping around in the 10.1.23 tarball, I don't see a lot of references
 >> to Lesser og LGPL.
 >> 
 >> Now, I know next to nothing about mariadb. Do you have any idea what is
 >> going on here?
 >> 
 > I am really not sure what is going on there.

:/

Could you perhaps try to contact the mariadb developers?
Ryan Coe May 19, 2017, 3:44 p.m. UTC | #4
Peter, All,


On 5/15/2017 6:51 AM, Peter Korsgaard wrote:
>>>>>> "Ryan" == Ryan Coe <bluemrp9@gmail.com> writes:
> Hi,
>
>   >> Thanks, I (obviously) want to apply this, but something odd is going on
>   >> with the licensing. COPYING.LESSER has been removed by this commit:
>   >>
>   >> https://github.com/MariaDB/server/commit/577915def8
>   >>
>   >> But the client library IS listed as being LGPL:
>   >>
>   >> https://mariadb.com/kb/en/mariadb/mariadb-connector-c/
>   >>
>   >> And same for the "old" one:
>   >>
>   >> https://mariadb.com/kb/en/mariadb/lgpl-mysql-client-library-32358/
>   >>
>   >> Grepping around in the 10.1.23 tarball, I don't see a lot of references
>   >> to Lesser og LGPL.
>   >>
>   >> Now, I know next to nothing about mariadb. Do you have any idea what is
>   >> going on here?
>   >>
>   > I am really not sure what is going on there.
>
> :/
>
> Could you perhaps try to contact the mariadb developers?
>
Below is the response that I received on this issue:

https://jira.mariadb.org/browse/MDEV-12297

This is the full story:

* All MySQL code, including libmysqlclient, is GPLv2
* When implementing async API for libmysqlclient, we have licensed it
   under LGPL. That's when COPYING.LESSER was added. Apparently someone
   thought that having both COPYING and COPYING.LESSER means that the
   project includes both GPL and LGPL components
* Then we got MDEV-12297, saying Github suddenly started showing MariaDB
   license as LGPL
* Github uses a library "licensee" to detect the license, and it was a
   recent bugfix in licensee to return "LGPL" when both COPYING and
   COPYING.LESSER are present.
* Indeed,https://www.gnu.org/licenses/gpl-howto.html  says that LGPL
   licensed projects should have both files. So licensee and Github were
   right.
* At that point in time we already have all async API code in
   MariaDB Connector/C library (which is LGPL as a whole), so the
   simplest solution was to remove COPYING.LESSER, basically relicensing
   async API for libmysqlclient under GPLv2.

Practically it changes nothing.
MariaDB server was and is GPLv2, we cannot change that.
libmysqlclient library was and is GPLv2, we cannot change that.
MariaDB Connector/C was and is LGPLv2.1
Peter Korsgaard May 21, 2017, 9:57 p.m. UTC | #5
>>>>> "Ryan" == Ryan Coe <bluemrp9@gmail.com> writes:

Hi,

 >> Could you perhaps try to contact the mariadb developers?
 >> 
 > Below is the response that I received on this issue:

 > https://jira.mariadb.org/browse/MDEV-12297

 > This is the full story:

 > * All MySQL code, including libmysqlclient, is GPLv2
 > * When implementing async API for libmysqlclient, we have licensed it
 >   under LGPL. That's when COPYING.LESSER was added. Apparently someone
 >   thought that having both COPYING and COPYING.LESSER means that the
 >   project includes both GPL and LGPL components
 > * Then we got MDEV-12297, saying Github suddenly started showing MariaDB
 >   license as LGPL
 > * Github uses a library "licensee" to detect the license, and it was a
 >   recent bugfix in licensee to return "LGPL" when both COPYING and
 >   COPYING.LESSER are present.
 > * Indeed,https://www.gnu.org/licenses/gpl-howto.html  says that LGPL
 >   licensed projects should have both files. So licensee and Github were
 >   right.
 > * At that point in time we already have all async API code in
 >   MariaDB Connector/C library (which is LGPL as a whole), so the
 >   simplest solution was to remove COPYING.LESSER, basically relicensing
 >   async API for libmysqlclient under GPLv2.

 > Practically it changes nothing.
 > MariaDB server was and is GPLv2, we cannot change that.
 > libmysqlclient library was and is GPLv2, we cannot change that.
 > MariaDB Connector/C was and is LGPLv2.1

Ok, thanks for checking!

Committed after adding this link and dropping COPYING.LESSER from
_LICENSE_FILES, thanks.
Peter Korsgaard June 1, 2017, 2:06 p.m. UTC | #6
>>>>> "Ryan" == Ryan Coe <bluemrp9@gmail.com> writes:

 > Fixes:
 > CVE-2017-3302 - Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and
 > 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29,
 > 10.1.x through 10.1.21, and 10.2.x through 10.2.3.

 > CVE-2017-3313 - Vulnerability in the MySQL Server component of Oracle MySQL
 > (subcomponent: Server: MyISAM). Supported versions that are affected are
 > 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to
 > exploit vulnerability allows low privileged attacker with logon to the
 > infrastructure where MySQL Server executes to compromise MySQL Server.
 > Successful attacks of this vulnerability can result in unauthorized access
 > to critical data or complete access to all MySQL Server accessible data.

 > CVE-2017-3308 - Vulnerability in the MySQL Server component of Oracle MySQL
 > (subcomponent: Server: DML). Supported versions that are affected are 5.5.54
 > and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable"
 > vulnerability allows low privileged attacker with network access via
 > multiple protocols to compromise MySQL Server. While the vulnerability is
 > in MySQL Server, attacks may significantly impact additional products.
 > Successful attacks of this vulnerability can result in unauthorized
 > ability to cause a hang or frequently repeatable crash (complete DOS) of
 > MySQL Server.

 > CVE-2017-3309 - Vulnerability in the MySQL Server component of Oracle MySQL
 > (subcomponent: Server: Optimizer). Supported versions that are affected are
 > 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily
 > "exploitable" vulnerability allows low privileged attacker with network
 > access via multiple protocols to compromise MySQL Server. While the
 > vulnerability is in MySQL Server, attacks may significantly impact
 > additional products. Successful attacks of this vulnerability can result
 > in unauthorized ability to cause a hang or frequently repeatable crash
 > (complete DOS) of MySQL Server.

 > CVE-2017-3453 - Vulnerability in the MySQL Server component of Oracle MySQL
 > (subcomponent: Server: Optimizer). Supported versions that are affected are
 > 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily
 > "exploitable" vulnerability allows low privileged attacker with network
 > access via multiple protocols to compromise MySQL Server. Successful attacks
 > of this vulnerability can result in unauthorized ability to cause a hang or
 > frequently repeatable crash (complete DOS) of MySQL Server.

 > CVE-2017-3456 - Vulnerability in the MySQL Server component of Oracle MySQL
 > (subcomponent: Server: DML). Supported versions that are affected are 5.5.54
 > and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable"
 > vulnerability allows high privileged attacker with network access via
 > multiple protocols to compromise MySQL Server. Successful attacks of this
 > vulnerability can result in unauthorized ability to cause a hang or
 > frequently repeatable crash (complete DOS) of MySQL Server.

 > CVE-2017-3464 - Vulnerability in the MySQL Server component of Oracle MySQL
 > (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54
 > and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable"
 > vulnerability allows low privileged attacker with network access via
 > multiple protocols to compromise MySQL Server. Successful attacks of this
 > vulnerability can result in unauthorized update, insert or delete access to
 > some of MySQL Server accessible data.

 > And a number of important, but non-security related fixes:

 > MDEV-12602: Fixed some race conditions in InnoDB encryption

 > MariaDB Backup alpha introduced

 > Galera wsrep library updated to 25.3.20

 > For details, see the release notes:
 > https://mariadb.com/kb/en/mariadb/mariadb-10123-release-notes/

 > Signed-off-by: Ryan Coe <bluemrp9@gmail.com>

Committed to 2017.02.x, thanks.
diff mbox

Patch

diff --git a/package/mariadb/mariadb.hash b/package/mariadb/mariadb.hash
index afcf37803..580fe987d 100644
--- a/package/mariadb/mariadb.hash
+++ b/package/mariadb/mariadb.hash
@@ -1,2 +1,2 @@ 
-# From https://downloads.mariadb.org/mariadb/10.1.22/
-sha256 bcb0572e7ad32cea9740a21e9255f733bdf60a5561ffbda317c22dd12b3966ce  mariadb-10.1.22.tar.gz
+# From https://downloads.mariadb.org/mariadb/10.1.23/
+sha256 54d8114e24bfa5e3ebdc7d69e071ad1471912847ea481b227d204f9d644300bf  mariadb-10.1.23.tar.gz
diff --git a/package/mariadb/mariadb.mk b/package/mariadb/mariadb.mk
index 5a1f06d86..672d45425 100644
--- a/package/mariadb/mariadb.mk
+++ b/package/mariadb/mariadb.mk
@@ -4,7 +4,7 @@ 
 #
 ################################################################################
 
-MARIADB_VERSION = 10.1.22
+MARIADB_VERSION = 10.1.23
 MARIADB_SITE = https://downloads.mariadb.org/interstitial/mariadb-$(MARIADB_VERSION)/source
 MARIADB_LICENSE = GPL-2.0 (server), GPL-2.0 with FLOSS exception (GPL client library), LGPL-2.0 (LGPL client library)
 MARIADB_LICENSE_FILES = README COPYING COPYING.LESSER