Activity log for bug #1447527

Date Who What changed Old value New value Message
2015-04-23 09:57:04 David Busby bug added bug
2015-04-23 10:00:19 David Busby description This morning we received a report from oCERT which is being treated as a public security issue in the MySQL client. In short it is possible for the MySQL client to silently fall back on a non SSL connection instead of aborting the connection, and as such communication will not be encrypted "in flight", this is known documented behaviour, This is now being assigned a CVE and an advisory is set for release April 29th, the body of the original notification follows. --- oCERT recently received a report from Adam Goodman, Principal Security Architect at Duo Security, concerning a security issue on MySQL client code. This issue affects MariaDB, and very likely Percona. as well and is related to https://mariadb.atlassian.net/browse/MDEV-7937 The issue concerns the impossibility for MySQL/MariaDB users (with any major stable version) to enforce an SSL connection without possibility for a MITM attach to perform a malicious downgrade. The issue affects MySQL versions before 5.7.3. However, these fixes have not been back-ported to previous major versions (5.5, 5.6, etc.), and MySQL 5.7 is not yet considered a stable release. Situation should be similar with MariaDB. Therefore the vast majority of MySQL/MariaDB users: a) have no ability to enforce SSL use, except by patching code or performing a major-version upgrade to a development release, and b) are probably not aware of this limitation The following links clearly illustrate the issue: https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390 http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/ http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-3.html While technically this is documented behaviour, it represents a pretty bad one and the feeling is that most users actually have no awareness of this. Therefore the consensus is to treat this as a vulnerability, a CVE is currently being assigned, distributions have been pre-notified and we are going to release an advisory on April 29th at 15:00 CET. We are also reaching MySQL and MariaDB following the original report from Duo Security and we are in the process of contacting other MySQL forks. --- This morning we received a report from oCERT which is being treated as a public security issue in the MySQL client. In short it is possible for the MySQL client to silently fall back on a non SSL connection instead of aborting the connection, and as such communication will not be encrypted "in flight", this is known documented behaviour, This is now being assigned a CVE and an advisory is set for release April 29th, the body of the original notification follows. --- This issue affects MariaDB, and very likely Percona. as well and is related to https://mariadb.atlassian.net/browse/MDEV-7937 The issue concerns the impossibility for MySQL/MariaDB users (with any major stable version) to enforce an SSL connection without possibility for a MITM attach to perform a malicious downgrade. The issue affects MySQL versions before 5.7.3. However, these fixes have not been back-ported to previous major versions (5.5, 5.6, etc.), and MySQL 5.7 is not yet considered a stable release. Situation should be similar with MariaDB. Therefore the vast majority of MySQL/MariaDB users: a) have no ability to enforce SSL use, except by patching code or performing a major-version upgrade to a development release, and b) are probably not aware of this limitation The following links clearly illustrate the issue: https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390 http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/ http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-3.html While technically this is documented behaviour, it represents a pretty bad one and the feeling is that most users actually have no awareness of this. ---
2015-04-23 10:03:11 David Busby information type Public Security Private Security
2015-04-23 10:42:13 David Busby cve linked 2015-3152
2015-04-23 12:45:29 Valerii Kravchuk nominated for series percona-server/5.5
2015-04-23 12:45:29 Valerii Kravchuk bug task added percona-server/5.5
2015-04-23 12:45:29 Valerii Kravchuk nominated for series percona-server/5.6
2015-04-23 12:45:29 Valerii Kravchuk bug task added percona-server/5.6
2015-04-23 12:45:55 Valerii Kravchuk percona-server/5.6: status New Confirmed
2015-04-23 12:46:08 Valerii Kravchuk percona-server/5.5: status New Confirmed
2015-04-24 04:32:48 Laurynas Biveinis percona-server/5.5: importance Undecided High
2015-04-24 04:32:51 Laurynas Biveinis percona-server/5.6: importance Undecided High
2015-04-24 04:33:26 Laurynas Biveinis percona-server/5.6: status Confirmed Triaged
2015-04-24 04:33:27 Laurynas Biveinis percona-server/5.5: status Confirmed Triaged
2015-04-24 04:33:32 Laurynas Biveinis tags security ssl security ssl upstream
2015-05-06 08:08:26 David Busby information type Private Security Public Security
2015-11-25 15:53:00 Laurynas Biveinis bug watch added http://bugs.mysql.com/bug.php?id=75368
2015-11-25 15:53:00 Laurynas Biveinis bug task added mysql-server
2015-11-25 15:53:18 Laurynas Biveinis nominated for series percona-server/5.7
2015-11-25 15:53:18 Laurynas Biveinis bug task added percona-server/5.7
2015-11-25 15:53:25 Laurynas Biveinis percona-server/5.7: importance Undecided High
2015-11-25 15:53:28 Laurynas Biveinis percona-server/5.7: status New Fix Committed
2015-11-25 15:53:31 Laurynas Biveinis percona-server/5.7: milestone 5.7.9-1
2015-12-08 10:41:19 Laurynas Biveinis percona-server/5.7: status Fix Committed Fix Released