CVE-2015-3152: MySQL SSL/TLS downgrade vulnerability
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| | mariadb-10.0 (Ubuntu) |
Undecided
|
Unassigned | ||
| | mariadb-5.5 (Ubuntu) |
Undecided
|
Unassigned | ||
Bug Description
For details see http://
Latest MariaDB release 5.5.44 fixes this.
From https:/
Client command line option --ssl-verify-
I am now preparing an security release for Ubuntu 14.04 and 14.10.
| description: | updated |
| Otto Kekäläinen (otto) wrote : | #1 |
| Otto Kekäläinen (otto) wrote : | #2 |
For complete pristine-
The attached debdiff is produced by running
mariadb-5.5$ git diff ubuntu/
Apply this debdiff on top of the current 5.5.43 package in Ubuntu 14.10 and for the non debian/* stuff, get the upstream mariadb-
| Otto Kekäläinen (otto) wrote : | #3 |
Successful builds (including test suite) visible at https:/
I have not had time yet to test actual installation or upgrade. Does your upload queue contain piuparts automation or similar?
| summary: |
- CVE-2015-3152: MySQL SSL/TLS downgrade downgrade vulnerability + CVE-2015-3152: MySQL SSL/TLS downgrade vulnerability |
| Seth Arnold (seth-arnold) wrote : | #4 |
We don't have piuparts in our update process.
For main packages, we use our "QRT" tests; for universe packages, we rely upon the submitters to perform testing.
I'm a little worried about making --ssl "mean something" -- MySQL apparently had a regression on RHEL/Centos due to weakdh-inspired DH changes in openssl: http://
Thanks
| Seth Arnold (seth-arnold) wrote : | #5 |
I'm uploading the packages to our ppa; I made one small change to the trusty changelog version, to 5.5.44-
Thanks Otto!
| Otto Kekäläinen (otto) wrote : | #6 |
I tested quickly running upgrade on a Trusty machine with ppa:mysql-
$ sudo add-apt-repository ppa:mysql-
$ apt-get update
$ apt-get upgrade
$ service mysql status
* /usr/bin/mysqladmin Ver 9.0 Distrib 5.5.44-MariaDB, for debian-linux-gnu on x86_64
Copyright (c) 2000, 2015, Oracle, MariaDB Corporation Ab and others.
Server version 5.5.44-
Protocol version 10
Connection Localhost via UNIX socket
UNIX socket /var/run/
Uptime: 55 sec
| Seth Arnold (seth-arnold) wrote : | #7 |
Otto, what do you think? I'm inclined to release these updates as-is: you've smoke-tested an upgrade, the build tests are impressive, and these updates have historically been pretty good. Is there any reason to hold back an update any longer?
Thanks
| Otto Kekäläinen (otto) wrote : | #8 |
Yeah, go ahead and upload
| Launchpad Janitor (janitor) wrote : | #9 |
This bug was fixed in the package mariadb-5.5 - 5.5.44-
---------------
mariadb-5.5 (5.5.44-
* SECURITY UPDATE: Update to 5.5.44 to fix security issues (LP: #1464895):
- CVE-2015-3152
* Upstream also includes lots of line ending changes (from CRLF -> LF)
* Removed hotfix patch now included in upstream release (MDEV-8115)
-- Otto Kekaelaeinen <email address hidden> Sat, 13 Jun 2015 21:09:48 +0300
| Changed in mariadb-5.5 (Ubuntu): | |
| status: | New → Fix Released |
| Launchpad Janitor (janitor) wrote : | #10 |
This bug was fixed in the package mariadb-5.5 - 5.5.44-
---------------
mariadb-5.5 (5.5.44-
* SECURITY UPDATE: Update to 5.5.44 to fix security issues (LP: #1464895):
- CVE-2015-3152
* Upstream also includes lots of line ending changes (from CRLF -> LF)
* Removed hotfix patch now included in upstream release (MDEV-8115)
-- Otto Kekaelaeinen <email address hidden> Sat, 13 Jun 2015 21:09:48 +0300
| Changed in mariadb-5.5 (Ubuntu): | |
| status: | New → Fix Released |
| Seth Arnold (seth-arnold) wrote : | #11 |
Excellent, thanks again Otto!
| information type: | Private Security → Public |
| Otto Kekäläinen (otto) wrote : | #12 |
The debdiff for 10.0.20 is attached to https:/
| Launchpad Janitor (janitor) wrote : | #13 |
This bug was fixed in the package mariadb-10.0 - 10.0.20-
---------------
mariadb-10.0 (10.0.20-
* SECURITY UPDATE: Update to 10.0.20 (via .18 and .19) fixes security issues:
- CVE-2015-3152: Client command line option --ssl-verify-
MYSQL_
together with --ssl will ensure that the established connection is
SSL-encrypted and the MariaDB server has a valid certificate.
(LP: #1464895)
- CVE-2014-8964: bundled PCRE contained heap-based buffer overflow
vulnerability that allowed the server to crash or have other unspecified
impact via a crafted regular expression made possible with the
REGEXP_SUBSTR function (MDEV-8006).
- CVE-2015-0501
- CVE-2015-2571
- CVE-2015-0505
- CVE-2015-0499
(LP: #1451677)
* New release includes fix for memory corruption on arm64 (LP: #1427406)
* Upstream also includes lots of line ending changes (from CRLF -> LF)
-- Otto Kekäläinen <email address hidden> Fri, 03 Jul 2015 17:39:42 +0300
| Changed in mariadb-10.0 (Ubuntu): | |
| status: | New → Fix Released |


For complete pristine- tar/git- buildpackage history see https:/ /github. com/ottok/ mariadb- 5.5/tree/ ubuntu- 14.04
The attached debdiff is produced by running 5.5.43- 1ubuntu0. 14.04.2 ubuntu-14.04 debian/ > 5.5.44- 1ubuntu0. 14.04.2. diff
mariadb-5.5$ git diff ubuntu/
Apply this debdiff on top of the current 5.5.43 package in Ubuntu 14.04 and for the non debian/* stuff, get the upstream mariadb- 5.5.44. tar.gz package from MariaDB.org (use uscan with pgp signature checking, the package supports it).