Commits on Source (59)
-
Otto Kekäläinen authored4b96bd2d
-
Otto Kekäläinen authorede07d9be7
-
Otto Kekäläinen authored
Update to upstream version '10.1.38' with Debian dir bf5887327d488168695833ed7a82628c14b6eac8
534b0c92 -
Otto Kekäläinen authored850a770a
-
0c3eba82
-
Otto Kekäläinen authored
Also migrate to using dockerbuilder following upstream Salsa-CI changes.
-
Otto Kekäläinen authored
-
Otto Kekäläinen authored
-
Otto Kekäläinen authored
Upstream developer confirmed the test is unimportant and it is OK to allow it to fail. https://jira.mariadb.org/browse/MDEV-17865
60b9d396 -
Otto Kekäläinen authorede05f3a2c
-
Otto Kekäläinen authored92995ff8
-
Otto Kekäläinen authored
-
Otto Kekäläinen authored
-
Otto Kekäläinen authored
-
Otto Kekäläinen authoreda0203da5
-
Otto Kekäläinen authored
Also cherry-pick autopkg tests fixes from mariadb-10.3@1ba2a673
c66b8b3c -
Otto Kekäläinen authorede9a6436a
-
Otto Kekäläinen authored89162d2f
-
Otto Kekäläinen authored
This makes e.g. Gitlab-CI run 3x as fast as without.
44b57694 -
Otto Kekäläinen authored936455fe
-
Otto Kekäläinen authored
By default the policy-rc.d exits with code 101 and prevents from services inside Docker to start with the rationale that it is not needed as the services will not run by default when a Docker container is started anyway, but we want the mysql/mariadb service to run so that we can simulate real install/upgrade scenarios.
-
Otto Kekäläinen authored
Also skip unstable rpl tests, as is also done in mariadb-10.3 packaging.
e6e45334 -
Otto Kekäläinen authored
-
Otto Kekäläinen authored7e54c6cf
-
Otto Kekäläinen authored
Update to upstream version '10.1.39' with Debian dir b02cce09df65b5e8c30006c7cfbae4ad19f48522
c90ffae0 -
Otto Kekäläinen authored
-
Otto Kekäläinen authoredfdf4a605
-
Otto Kekäläinen authored
Update to upstream version '10.1.40' with Debian dir 15cc3e72f57cb6e256589bbd093000a8153d41c0
619e1756 -
Otto Kekäläinen authored
-
Otto Kekäläinen authored
- Update lintian stage with new Salsa-CI code Copied from salsa-ci-team/pipeline@aa99acdb - Stop sending stats to non-responsive server prittiau.debian.net Fixes error: curl: (7) Failed to connect to prittiau.debian.net port 443: Connection timed out
-
Otto Kekäläinen authored
-
Otto Kekäläinen authored
-
Otto Kekäläinen authored91e56d63
-
Otto Kekäläinen authored
Update to upstream version '10.1.41' with Debian dir ab22fd6ba200522d2bda2b45f0d98a2684b1cf39
16673fe6 -
Otto Kekäläinen authored
-
Otto Kekäläinen authored
-
Otto Kekäläinen authored
This has no functional changes to the Gitlab-CI test run in MariaDB, this is purely to satisfy the gitlab-ci.yml linter.
0d034c2b -
Otto Kekäläinen authored
Salsa-CI changed the path names of .ccache and thus MariaDB builds stopped working as the file size of the artifact directory with .ccache included was way over limits. These changes put the .ccache directory in the correct place and slims down the amount of total artifacts.
-
Otto Kekäläinen authoredad8b0768
-
Otto Kekäläinen authored
Update to upstream version '10.1.43' with Debian dir 28389ca77b08944a509cfe5ff31c476bd7929c73
4810f50f -
Otto Kekäläinen authored
-
Otto Kekäläinen authored33151954
-
Otto Kekäläinen authored
Upstream version 10.1.44
cae8cb8a -
Otto Kekäläinen authored
-
Otto Kekäläinen authoredd9fabda5
-
Otto Kekäläinen authored
Update to upstream version '10.1.45' with Debian dir f3522750297ee14fc7d5f3fe329224a1518fdee2
86684e94 -
Otto Kekäläinen authored
-
Otto Kekäläinen authored882cd374
-
Otto Kekäläinen authored
Update to upstream version '10.1.47' with Debian dir 4f67c6446cb4f6cff0f77d32fab40887cdef02f7
1e30bb29 -
Otto Kekäläinen authored
-
Otto Kekäläinen authored
The salsa-ci.yml contains references to files that when changed "upstream" mandate changes downstream so that the pipelines will work again. include: - https://salsa.debian.org/salsa-ci-team/pipeline/raw/master/salsa-ci.yml - https://salsa.debian.org/salsa-ci-team/pipeline/raw/master/pipeline-jobs.yml
3c988a7b -
Otto Kekäläinen authored
-
Otto Kekäläinen authoredb4af70da
-
Otto Kekäläinen authored
Update to upstream version '10.1.48' with Debian dir 9206a6fb1951731a2dc8333d4e43f25d3165e7a5
16c23e1b -
2d7074d3
-
-
mariadb-10.1 (10.1.48-0+deb9u3) stretch-security; urgency=medium * Non-maintainer upload by the ELTS Security Team. * Use ELTS CI. * Fix CVE-2021-2154: An Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS). The UDF_INIT() function caused a crash. * Fix CVE-2021-2166: An Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS). Plugin variables in SET were not correctly locked. * Fix CVE-2021-2194: An Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS). In Full-text phrase search, MariaDB filter out row that do not contain all the tokens in the phrase. If MariaDB do not filter out doc_id that doesn't appear in all the token's doc_id lists then hit an assert. * Fix CVE-2021-2389: An Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS). Server throws OOM error when we execute twitter load with SELECTs for UPDATE + UPDATES, and SELECT queries on tables with full-text index. * Fix CVE-2021-46657: get_sort_by_table in MariaDB allowed an application crash via certain subquery uses of ORDER BY. * Fix CVE-2021-46661: MariaDB allowed an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE). * Fix CVE-2021-46663: MariaDB allowed a ha_maria::extra application crash via certain SELECT statements. * Fix CVE-2021-46664: MariaDB crashed in sub_select_postjoin_aggr for a NULL value of aggr. * Fix CVE-2021-46665: MariaDB crashed because of incorrect used_tables expectations. * Fix CVE-2021-46666: MariaDB crashed because of mishandling of a pushdown from a HAVING clause to a WHERE clause. * Fix CVE-2021-46667: MariadDB was vulnerable due to a sql_lex.cc integer overflow, leading to an application crash. * Fix CVE-2021-46668: MariaDB crashed via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures. * Fix CVE-2021-46669: MariaDB allowed attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
ed57557e -
mariadb-10.1 (10.1.48-0+deb9u4) stretch-security; urgency=medium * Non-maintainer upload by the ELTS Security Team. [Roberto C. Sánchez] * Fix CVE-2021-46659: an application crash existed because MariaDB does not recognize that SELECT_LEX::nest_level is local to each VIEW [Bastien Roucariès] * Fix CVE-2022-21427: An Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MariaDB Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS). Certain UTF8 combining marks cause MariaDB to crash when doing Full-Text searches. * Fix CVE-2022-24048, CVE-2022-24051, CVE-2022-24052: MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Concerned storage Engine were JSON, XML, MYSQL. * CVE-2022-24050: MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. * CVE-2022-27380: An issue in the component my_decimal::operator= of MariaDB Server was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. * CVE-2022-27383: An use-after-free was found in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements. * Fix CVE-2022-27384, CVE-2022-32083 An issue in the component Item_subselect::init_expr_cache_tracker allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. * Fix CVE-2022-27387: a global buffer overflow in the component decimal_bin_size was found, which is exploited via specially crafted SQL statements. * Fix CVE-2022-27448: There is an Assertion failure via 'node->pcur->rel_pos == BTR_PCUR_ON'. This could lead to a crash in multi-update and implicit grouping * Fix CVE-2022-31622: Fix a Denial of Service. When an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock
1a0016fd -
mariadb-10.1 (10.1.48-0+deb9u5) stretch-security; urgency=medium * Non-maintainer upload by the ELTS Security Team. * Fix CVE-2022-31621: A Denial of Service (Dos) was found. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. * Fix CVE-2022-31623: In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service (DoS) due to the deadlock. * Fix CVE-2022-31624: While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service (DoS) due to the deadlock. * Fix CVE-2022-47015: MariaDB was affected by Denial of Service (DoS). It is possible for function spider_db_mbase::print_warnings to dereference a null pointer. * Fix CVE-2024-21096: A difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MariaDB Server executes to compromise MariaDB Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MariaDB Server accessible data as well as unauthorized read access to a subset of MariaDB Server accessible data and unauthorized ability to cause a partial denial of service (partial DoS)
Showing
- .clang-format 117 additions, 0 deletions.clang-format
- .gitignore 2 additions, 0 deletions.gitignore
- BUILD/FINISH.sh 1 addition, 1 deletionBUILD/FINISH.sh
- BUILD/SETUP.sh 1 addition, 1 deletionBUILD/SETUP.sh
- BUILD/autorun.sh 1 addition, 1 deletionBUILD/autorun.sh
- BUILD/check-cpu 7 additions, 1 deletionBUILD/check-cpu
- BUILD/cleanup 1 addition, 1 deletionBUILD/cleanup
- BUILD/cmake_configure.sh 1 addition, 1 deletionBUILD/cmake_configure.sh
- BUILD/compile-alpha 1 addition, 1 deletionBUILD/compile-alpha
- BUILD/compile-amd64-debug-max 1 addition, 1 deletionBUILD/compile-amd64-debug-max
- BUILD/compile-amd64-debug-max-no-ndb 1 addition, 1 deletionBUILD/compile-amd64-debug-max-no-ndb
- BUILD/compile-amd64-gcov 1 addition, 1 deletionBUILD/compile-amd64-gcov
- BUILD/compile-amd64-gprof 1 addition, 1 deletionBUILD/compile-amd64-gprof
- BUILD/compile-amd64-max 1 addition, 1 deletionBUILD/compile-amd64-max
- BUILD/compile-amd64-valgrind-max 1 addition, 1 deletionBUILD/compile-amd64-valgrind-max
- BUILD/compile-bintar 1 addition, 1 deletionBUILD/compile-bintar
- BUILD/compile-darwin-mwcc 1 addition, 1 deletionBUILD/compile-darwin-mwcc
- BUILD/compile-dist 1 addition, 1 deletionBUILD/compile-dist
- BUILD/compile-hpux11-parisc2-aCC 1 addition, 1 deletionBUILD/compile-hpux11-parisc2-aCC
- BUILD/compile-ia64-debug-max 1 addition, 1 deletionBUILD/compile-ia64-debug-max
Some changes are not shown.
For a faster browsing experience, only 20 of 1000+ files are shown. Download one of the files below to see all changes.
.clang-format
0 → 100644