Bug 15740 - mariadb 5.5.43
Summary: mariadb 5.5.43
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/641082/
Whiteboard: has_procedure advisory MGA4-32-OK MGA...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-04-20 17:44 CEST by David Walser
Modified: 2015-05-26 21:02 CEST (History)
4 users (show)

See Also:
Source RPM: mariadb-5.5.42-1.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-04-20 17:44:35 CEST
MySQL 5.5.43 is out, which, according to the latest Oracle CPU, fixes:
CVE-2015-0499, CVE-2015-0501, CVE-2015-0505, CVE-2015-2571

The CPU is here:
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

Debian has issued an advisory for this on April 19:
https://www.debian.org/security/2015/dsa-3229

AFAIK, MariaDB 5.5.43 isn't out yet, but obviously we should update when it is.

Reproducible: 

Steps to Reproduce:
David Walser 2015-04-20 20:41:31 CEST

URL: (none) => http://lwn.net/Vulnerabilities/641082/

Comment 1 Oden Eriksson 2015-05-04 18:21:10 CEST
mariadb-5.5.43-1.mga4 has been submitted now.

CC: (none) => oe

Comment 2 David Walser 2015-05-04 18:48:28 CEST
Thanks Oden!

Advisory to come later.

Package list:

mariadb-5.5.43-1.mga4
mysql-MariaDB-5.5.43-1.mga4
mariadb-feedback-5.5.43-1.mga4
mariadb-extra-5.5.43-1.mga4
mariadb-obsolete-5.5.43-1.mga4
mariadb-core-5.5.43-1.mga4
mariadb-common-core-5.5.43-1.mga4
mariadb-common-5.5.43-1.mga4
mariadb-client-5.5.43-1.mga4
mariadb-bench-5.5.43-1.mga4
libmariadb18-5.5.43-1.mga4
libmariadb-devel-5.5.43-1.mga4
libmariadb-embedded18-5.5.43-1.mga4
libmariadb-embedded-devel-5.5.43-1.mga4

from mariadb-5.5.43-1.mga4.src.rpm

CC: (none) => alien
Assignee: alien => qa-bugs

Comment 3 Oden Eriksson 2015-05-05 13:11:02 CEST
https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer (CVE-2015-2571).

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL (CVE-2015-0505).

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling (CVE-2015-0501).

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated (CVE-2015-0499).
Comment 5 David Walser 2015-05-05 15:44:53 CEST
Thanks Oden!

Advisory:
========================

Updated mariadb packages fix security vulnerabilities:

This update provides MariaDB 5.5.43, which fixes several security
issues and other bugs. Please refer to the Oracle Critical Patch Update
Advisories and the Release Notes for MariaDB for further information
regarding the security vulnerabilities.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html#AppendixMSQL
http://www.mandriva.com/en/support/security/advisories/mbs2/MDVSA-2015%3A227/
Comment 6 David Walser 2015-05-05 16:55:02 CEST
Update works fine on our production Moodle server at work, Mageia 4 i586.

Whiteboard: (none) => MGA4-32-OK

Comment 7 Lewis Smith 2015-05-06 13:58:37 CEST
Testing (very minimally) MGA4 x64 real hardware.

Having played with phpmyadmin and Moodle (using MariaDB), everything seems to function within my meagre knowledge especially of how to drive Moodle.
So, thanks to David's more +ve feedback Comment 5: OK.

CC: (none) => lewyssmith
Whiteboard: MGA4-32-OK => MGA4-32-OK MGA4-64-OK

Comment 8 claire robinson 2015-05-06 14:50:47 CEST
Validating. Advisory uploaded.

Please push to 4 updates

Thanks!

Keywords: (none) => validated_update
Whiteboard: MGA4-32-OK MGA4-64-OK => has_procedure advisory MGA4-32-OK MGA4-64-OK
CC: (none) => sysadmin-bugs

Comment 9 Mageia Robot 2015-05-06 17:16:40 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0193.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

Comment 10 David Walser 2015-05-26 21:02:53 CEST
Other CVEs that may have been relevant:
http://lwn.net/Vulnerabilities/645935/

Note You need to log in before you can comment on or make changes to this bug.