Date: Wed, 03 May 2017 15:07:42 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 219045] databases/mariadb101-server: Upgrade to latest version(v10.1.23) - current(v10.1.22) has critical vulnerabilities Message-ID: <bug-219045-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219045 Bug ID: 219045 Summary: databases/mariadb101-server: Upgrade to latest version(v10.1.23) - current(v10.1.22) has critical vulnerabilities Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: brnrd@freebsd.org Reporter: i.dani@outlook.com Assignee: brnrd@freebsd.org Flags: maintainer-feedback?(brnrd@freebsd.org) The current version avilable for FreeBSD is vulnerable since 19.04.2017 and= has now been patched upstream. There are very critical vulnerabilities in it. See here: https://mariadb.com/kb/en/mariadb/mariadb-10123-release-notes/ Available port version: 10.1.22 Patched version: 10.1.23 Important Changes Fixes for the following security vulnerabilities: CVE-2017-3302 CVE-2017-3313 CVE-2017-3308 CVE-2017-3309 CVE-2017-3453 CVE-2017-3456 CVE-2017-3464=20 Fixes: MDEV-12602: Fixed some race conditions in InnoDB encryption MariaDB Backup alpha introduced Galera wsrep library updated to 25.3.20 Packages for Ubuntu 17.04 "zesty" added As per the MariaDB Deprecation Policy, this will be the last release of MariaDB 10.1 for Ubuntu 12.04 LTS "Precise" and Mint 13 LTS "Maya"=20 -> Full Changelog: https://mariadb.com/kb/en/mariadb-10123-changelog/ --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219045-13>