Hello community,
here is the log from the commit of package mysql-community-server for
openSUSE:Factory checked in at 2015-12-03 13:31:50
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/mysql-community-server (Old)
and /work/SRC/openSUSE:Factory/.mysql-community-server.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "mysql-community-server"
Changes:
--------
---
/work/SRC/openSUSE:Factory/mysql-community-server/mysql-community-server.changes
2015-09-02 00:36:23.000000000 +0200
+++
/work/SRC/openSUSE:Factory/.mysql-community-server.new/mysql-community-server.changes
2015-12-03 13:31:53.000000000 +0100
@@ -1,0 +2,22 @@
+Mon Nov 30 11:50:34 UTC 2015 - [email protected]
+
+- update to 5.6.27
+ * changes:
+ http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-27.html
+ * fixed CVEs:
+ CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
+ CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
+ CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
+ CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
+ CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
+ CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
+ CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
+ CVE-2015-4913
+ * fix [bnc#951391]
+- add mysql-community-server-5.6.26-enforce_ssl.patch to fix MySQL lack
+ of SSL enforcement. Using --ssl-verify-server-cert and --ssl[-*]
+ implies that the ssl connection is required. The mysql client will
+ now print an error if ssl is required, but the server can not handle
+ a ssl connection [bnc#924663], [bnc#928962], [CVE-2015-3152].
+
+-------------------------------------------------------------------
Old:
----
mysql-5.6.26.tar.gz
New:
----
mysql-5.6.27.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ mysql-community-server.spec ++++++
--- /var/tmp/diff_new_pack.95lfys/_old 2015-12-03 13:31:56.000000000 +0100
+++ /var/tmp/diff_new_pack.95lfys/_new 2015-12-03 13:31:56.000000000 +0100
@@ -44,7 +44,7 @@
%define with_cassandra 0
%endif
Name: mysql-community-server
-Version: 5.6.26
+Version: 5.6.27
Release: 0
Summary: Server part of %{pretty_name}
License: SUSE-GPL-2.0-with-FLOSS-exception
@@ -127,8 +127,8 @@
Obsoletes: %{extra_provides}-debug-version < %{version}
BuildRoot: %{_tmppath}/%{name}-%{version}-build
%{?systemd_requires}
-# On mariadb we want readline5 and on mysql we use libedit from system
-%if "%{name}" == "mariadb"
+# On mariadb we want readline5 (except for SLE12) and on mysql we use libedit
from system
+%if ("%{name}" == "mariadb" ) && ! (( 0%{?suse_version} == 1315 ) && ( !
0%{?is_opensuse} ))
BuildRequires: readline5-devel
%else
BuildRequires: libedit-devel
++++++ configuration-tweaks.tar.bz2 ++++++
++++++ mysql-5.6.26.tar.gz -> mysql-5.6.27.tar.gz ++++++
/work/SRC/openSUSE:Factory/mysql-community-server/mysql-5.6.26.tar.gz
/work/SRC/openSUSE:Factory/.mysql-community-server.new/mysql-5.6.27.tar.gz
differ: char 5, line 1
++++++ mysql-patches.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/mysql-patches/mysql-patches/mysql-community-server-5.6.26-enforce_ssl.patch
new/mysql-patches/mysql-patches/mysql-community-server-5.6.26-enforce_ssl.patch
---
old/mysql-patches/mysql-patches/mysql-community-server-5.6.26-enforce_ssl.patch
1970-01-01 01:00:00.000000000 +0100
+++
new/mysql-patches/mysql-patches/mysql-community-server-5.6.26-enforce_ssl.patch
2015-10-05 20:41:09.000000000 +0200
@@ -0,0 +1,66 @@
+PATCH-P1-FIX: fix MySQL lack of SSL enforcement
+BUGS: bnc#924663, bnc#928962, CVE-2015-3152
+
+Maintainer: Kristyna Streitova <[email protected]>
+
+From 4ef74979969ac9339d0d42c11a6f26632e6776f1 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Vicen=C8=9Biu=20Ciorbaru?= <[email protected]>
+Date: Tue, 9 Jun 2015 14:08:44 +0300
+Subject: [PATCH] MDEV-7937: Enforce SSL when --ssl client option is used
+
+Using --ssl-verify-server-cert and --ssl[-*] implies that
+the ssl connection is required. The mysql client will now print an error if ssl
+is required, but the server can not handle a ssl connection.
+---
+ sql-common/client.c | 23 +++++++++++++++++++----
+ 1 file changed, 19 insertions(+), 4 deletions(-)
+
+Index: mysql-5.6.26/sql-common/client.c
+===================================================================
+--- mysql-5.6.26.orig/sql-common/client.c
++++ mysql-5.6.26/sql-common/client.c
+@@ -1742,6 +1742,7 @@ mysql_ssl_set(MYSQL *mysql __attribute__
+ mysql_options(mysql, MYSQL_OPT_SSL_CAPATH, capath) +
+ mysql_options(mysql, MYSQL_OPT_SSL_CIPHER, cipher)
+ ? 1 : 0;
++ mysql->options.use_ssl = TRUE;
+ #endif
+ DBUG_RETURN(result);
+ }
+@@ -2600,12 +2601,6 @@ static int send_client_reply_packet(MCPV
+ mysql->client_flag|= CLIENT_MULTI_RESULTS;
+
+ #if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
+- if (mysql->options.ssl_key || mysql->options.ssl_cert ||
+- mysql->options.ssl_ca || mysql->options.ssl_capath ||
+- mysql->options.ssl_cipher ||
+- (mysql->options.extension && mysql->options.extension->ssl_crl) ||
+- (mysql->options.extension && mysql->options.extension->ssl_crlpath))
+- mysql->options.use_ssl= 1;
+ if (mysql->options.use_ssl)
+ mysql->client_flag|= CLIENT_SSL;
+ #endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY*/
+@@ -2639,6 +2634,23 @@ static int send_client_reply_packet(MCPV
+ end= buff+5;
+ }
+ #ifdef HAVE_OPENSSL
++
++ /*
++ If client uses ssl and client also has to verify the server
++ certificate, a ssl connection is required.
++ If the server does not support ssl, we abort the connection.
++ */
++ if (mysql->options.use_ssl &&
++ (mysql->client_flag & CLIENT_SSL_VERIFY_SERVER_CERT) &&
++ !(mysql->server_capabilities & CLIENT_SSL))
++ {
++ set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate,
++ ER(CR_SSL_CONNECTION_ERROR),
++ "SSL is required, but the server does not "
++ "support it");
++ goto error;
++ }
++
+ if (mysql->client_flag & CLIENT_SSL)
+ {
+ /* Do the SSL layering. */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/mysql-patches/tools/gettar.sh
new/mysql-patches/tools/gettar.sh
--- old/mysql-patches/tools/gettar.sh 2015-06-16 13:03:35.000000000 +0200
+++ new/mysql-patches/tools/gettar.sh 2015-10-13 17:20:20.000000000 +0200
@@ -53,7 +53,7 @@
TO_PACK="./tools ./README ./MAINTAINERS"
-echo "Will create tarball from following patches:"
+echo "Will create tarball from the following patches:"
while read patch; do
patch="`echo "$patch" | sed -e 's|^[[:blank:]]*||' -e
's|[[:blank:]]*#.*||'`"
[ -z "$patch" ] && continue
@@ -63,7 +63,7 @@
exit 1
fi
TO_PACK="$TO_PACK ./$NAME/$patch"
- echo " * $patch"
+ echo " $patch"
done << EOF
`echo "$series" | while read serie; do
cat "$serie"
++++++ series ++++++
--- /var/tmp/diff_new_pack.95lfys/_old 2015-12-03 13:31:56.000000000 +0100
+++ /var/tmp/diff_new_pack.95lfys/_new 2015-12-03 13:31:56.000000000 +0100
@@ -11,3 +11,4 @@
mysql-community-server-5.6.12-srv_buf_size.patch
mysql-community-server-5.6.12-logrotate-su.patch
mysql-community-server-5.6.24-static_library.patch
+mysql-community-server-5.6.26-enforce_ssl.patch