Skip to content
GitLab
Menu
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
Faustin Lammler
mariadb-10.1
Commits
4ef93480
Commit
4ef93480
authored
May 04, 2017
by
Ondrej Sury
Browse files
Add CVE list for 10.1.23 release
parent
d2689e8f
Changes
1
Hide whitespace changes
Inline
Side-by-side
debian/changelog
View file @
4ef93480
mariadb
-
10.1
(
10.1.23
-
1
)
unstable
;
urgency
=
medium
mariadb
-
10.1
(
10.1.23
-
1
)
unstable
;
urgency
=
medium
*
New
upstream
version
10.1.23
*
New
upstream
version
10.1.23
,
includes
fixes
for
the
following
security
vulnerabilities
:
-
[
CVE
-
2017
-
3302
]:
use
-
after
-
free
in
C
client
library
for
MySQL
-
[
CVE
-
2017
-
3313
]:
unauthorized
(
local
)
access
to
critical
data
or
complete
access
to
all
MySQL
Server
accessible
data
-
[
CVE
-
2017
-
3308
]:
unauthorized
(
network
)
ability
to
cause
a
hang
or
frequently
repeatable
crash
-
[
CVE
-
2017
-
3309
]:
unauthorized
(
network
)
ability
to
cause
a
hang
or
frequently
repeatable
crash
-
[
CVE
-
2017
-
3453
]:
unauthorized
(
network
)
ability
to
cause
a
hang
or
frequently
repeatable
crash
-
[
CVE
-
2017
-
3456
]:
unauthorized
(
network
)
ability
to
cause
a
hang
or
frequently
repeatable
crash
-
[
CVE
-
2017
-
3464
]:
unauthorized
update
,
insert
or
delete
access
to
some
of
MySQL
Server
accessible
data
*
Refresh
debian
/
patches
on
top
of
MariaDB
10.1.23
release
*
Refresh
debian
/
patches
on
top
of
MariaDB
10.1.23
release
*
debian
/
gbp
.
conf
:
Filter
most
common
cruft
in
the
orig
tarball
*
debian
/
gbp
.
conf
:
Filter
most
common
cruft
in
the
orig
tarball
*
debian
/
rules
:
Use
--
fail
-
missing
to
catch
extra
upstream
files
*
debian
/
rules
:
Use
--
fail
-
missing
to
catch
extra
upstream
files
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment