mirror of
https://github.com/MariaDB/server.git
synced 2025-01-17 04:22:27 +01:00
Merge pilot.mysql.com:/home/msvensson/mysql/mysql-5.0-maint
into pilot.mysql.com:/home/msvensson/mysql/mysql-5.1-new-maint mysql-test/mysql-test-run.pl: Auto merged mysql-test/r/loaddata.result: Auto merged mysql-test/r/query_cache.result: Auto merged mysql-test/r/type_blob.result: Auto merged mysql-test/t/loaddata.test: Auto merged mysql-test/t/query_cache.test: Auto merged mysql-test/t/type_blob.test: Auto merged sql/item_strfunc.cc: Auto merged sql/mysql_priv.h: Auto merged sql/sql_class.cc: Auto merged sql/sql_load.cc: Auto merged sql/mysqld.cc: Manual merge of OPT_SECUREE_FILE_PRIV sql/set_var.cc: Manual merge sql/share/errmsg.txt: Manual merge, change is already in 5.1 sql/sql_class.h: Manual mergem change is already in 5.1
This commit is contained in:
commit
fe46b0ff6c
16 changed files with 133 additions and 34 deletions
|
@ -3596,6 +3596,12 @@ sub mysqld_arguments ($$$$$) {
|
|||
mtr_add_arg($args, "%s--basedir=%s", $prefix, $path_my_basedir);
|
||||
mtr_add_arg($args, "%s--character-sets-dir=%s", $prefix, $path_charsetsdir);
|
||||
|
||||
if ( $mysql_version_id >= 50036)
|
||||
{
|
||||
# Prevent the started mysqld to access files outside of vardir
|
||||
mtr_add_arg($args, "%s--secure-file-priv=%s", $prefix, $opt_vardir);
|
||||
}
|
||||
|
||||
if ( $mysql_version_id >= 50000 )
|
||||
{
|
||||
mtr_add_arg($args, "%s--log-bin-trust-function-creators", $prefix);
|
||||
|
|
|
@ -148,6 +148,22 @@ select * from t1;
|
|||
a b c
|
||||
10 NULL Ten
|
||||
15 NULL Fifteen
|
||||
show variables like "secure_file_pri%";
|
||||
Variable_name Value
|
||||
secure_file_priv MYSQLTEST_VARDIR/
|
||||
select @@secure_file_priv;
|
||||
@@secure_file_priv
|
||||
MYSQLTEST_VARDIR/
|
||||
set @@secure_file_priv= 0;
|
||||
ERROR HY000: Variable 'secure_file_priv' is a read only variable
|
||||
truncate table t1;
|
||||
load data infile 'MYSQL_TEST_DIR/Makefile' into table t1;
|
||||
ERROR HY000: The MySQL server is running with the --secure-file-priv option so it cannot execute this statement
|
||||
select * from t1;
|
||||
a b c
|
||||
select load_file("MYSQL_TEST_DIR/Makefile");
|
||||
load_file("MYSQL_TEST_DIR/Makefile")
|
||||
NULL
|
||||
drop table t1, t2;
|
||||
CREATE TABLE t1 (a int);
|
||||
INSERT INTO t1 VALUES (1);
|
||||
|
|
Binary file not shown.
|
@ -624,7 +624,7 @@ word
|
|||
show status like "Qcache_queries_in_cache";
|
||||
Variable_name Value
|
||||
Qcache_queries_in_cache 1
|
||||
load data infile 'TEST_DIR/std_data/words.dat' into table t1;
|
||||
load data infile 'MYSQLTEST_VARDIR/std_data_ln/words.dat' into table t1;
|
||||
show status like "Qcache_queries_in_cache";
|
||||
Variable_name Value
|
||||
Qcache_queries_in_cache 0
|
||||
|
|
|
@ -506,26 +506,26 @@ create table t1 (id integer auto_increment unique,imagem LONGBLOB not null defau
|
|||
Warnings:
|
||||
Warning 1101 BLOB/TEXT column 'imagem' can't have a default value
|
||||
insert into t1 (id) values (1);
|
||||
select
|
||||
charset(load_file('../../std_data/words.dat')),
|
||||
collation(load_file('../../std_data/words.dat')),
|
||||
coercibility(load_file('../../std_data/words.dat'));
|
||||
charset(load_file('../../std_data/words.dat')) collation(load_file('../../std_data/words.dat')) coercibility(load_file('../../std_data/words.dat'))
|
||||
select
|
||||
charset(load_file('../std_data_ln/words.dat')),
|
||||
collation(load_file('../std_data_ln/words.dat')),
|
||||
coercibility(load_file('../std_data_ln/words.dat'));
|
||||
charset(load_file('../std_data_ln/words.dat')) collation(load_file('../std_data_ln/words.dat')) coercibility(load_file('../std_data_ln/words.dat'))
|
||||
binary binary 4
|
||||
explain extended select
|
||||
charset(load_file('../../std_data/words.dat')),
|
||||
collation(load_file('../../std_data/words.dat')),
|
||||
coercibility(load_file('../../std_data/words.dat'));
|
||||
explain extended select
|
||||
charset(load_file('MYSQLTEST_VARDIR/std_data_ln/words.dat')),
|
||||
collation(load_file('MYSQLTEST_VARDIR/std_data_ln/words.dat')),
|
||||
coercibility(load_file('MYSQLTEST_VARDIR/std_data_ln/words.dat'));
|
||||
id select_type table type possible_keys key key_len ref rows filtered Extra
|
||||
1 SIMPLE NULL NULL NULL NULL NULL NULL NULL NULL No tables used
|
||||
Warnings:
|
||||
Note 1003 select charset(load_file(_latin1'../../std_data/words.dat')) AS `charset(load_file('../../std_data/words.dat'))`,collation(load_file(_latin1'../../std_data/words.dat')) AS `collation(load_file('../../std_data/words.dat'))`,coercibility(load_file(_latin1'../../std_data/words.dat')) AS `coercibility(load_file('../../std_data/words.dat'))`
|
||||
update t1 set imagem=load_file('../../std_data/words.dat') where id=1;
|
||||
Note 1003 select charset(load_file(_latin1'MYSQLTEST_VARDIR/std_data_ln/words.dat')) AS `charset(load_file('MYSQLTEST_VARDIR/std_data_ln/words.dat'))`,collation(load_file(_latin1'MYSQLTEST_VARDIR/std_data_ln/words.dat')) AS `collation(load_file('MYSQLTEST_VARDIR/std_data_ln/words.dat'))`,coercibility(load_file(_latin1'MYSQLTEST_VARDIR/std_data_ln/words.dat')) AS `coercibility(load_file('MYSQLTEST_VARDIR/std_data_ln/words.dat'))`
|
||||
update t1 set imagem=load_file('MYSQLTEST_VARDIR/std_data_ln/words.dat') where id=1;
|
||||
select if(imagem is null, "ERROR", "OK"),length(imagem) from t1 where id = 1;
|
||||
if(imagem is null, "ERROR", "OK") length(imagem)
|
||||
OK 581
|
||||
drop table t1;
|
||||
create table t1 select load_file('../../std_data/words.dat') l;
|
||||
create table t1 select load_file('MYSQLTEST_VARDIR/std_data_ln/words.dat') l;
|
||||
show full fields from t1;
|
||||
Field Type Collation Null Key Default Extra Privileges Comment
|
||||
l longblob NULL YES NULL #
|
||||
|
|
|
@ -114,6 +114,29 @@ truncate table t1;
|
|||
load data infile '../std_data_ln/rpl_loaddata.dat' into table t1 (@dummy,@n) set a= @n, c= (select str from t2 where num=@n);
|
||||
select * from t1;
|
||||
|
||||
#
|
||||
# Bug#18628 mysql-test-run: security problem
|
||||
#
|
||||
# It should not be possible to load from a file outside of vardir
|
||||
|
||||
--replace_result $MYSQLTEST_VARDIR MYSQLTEST_VARDIR
|
||||
show variables like "secure_file_pri%";
|
||||
--replace_result $MYSQLTEST_VARDIR MYSQLTEST_VARDIR
|
||||
select @@secure_file_priv;
|
||||
--error 1238
|
||||
set @@secure_file_priv= 0;
|
||||
|
||||
# Test "load data"
|
||||
truncate table t1;
|
||||
--replace_result $MYSQL_TEST_DIR MYSQL_TEST_DIR
|
||||
--error 1290
|
||||
eval load data infile '$MYSQL_TEST_DIR/Makefile' into table t1;
|
||||
select * from t1;
|
||||
|
||||
# Test "load_file" returns NULL
|
||||
--replace_result $MYSQL_TEST_DIR MYSQL_TEST_DIR
|
||||
eval select load_file("$MYSQL_TEST_DIR/Makefile");
|
||||
|
||||
# cleanup
|
||||
drop table t1, t2;
|
||||
|
||||
|
|
|
@ -84,3 +84,15 @@ FIELDS TERMINATED BY ',' OPTIONALLY ENCLOSED BY '"'
|
|||
FROM schemata LIMIT 0, 5;
|
||||
enable_query_log;
|
||||
--exec rm $MYSQLTEST_VARDIR/tmp/outfile-test.4
|
||||
use test;
|
||||
|
||||
#
|
||||
# Bug#18628 mysql-test-run: security problem
|
||||
#
|
||||
# It should not be possible to write to a file outside of vardir
|
||||
create table t1(a int);
|
||||
--replace_result $MYSQL_TEST_DIR MYSQL_TEST_DIR
|
||||
--error 1290
|
||||
eval select * into outfile "$MYSQL_TEST_DIR/outfile-test1" from t1;
|
||||
drop table t1;
|
||||
|
||||
|
|
|
@ -409,8 +409,8 @@ select * from t1 where id=2;
|
|||
create table t1 (word char(20) not null);
|
||||
select * from t1;
|
||||
show status like "Qcache_queries_in_cache";
|
||||
--replace_result $MYSQL_TEST_DIR TEST_DIR
|
||||
eval load data infile '$MYSQL_TEST_DIR/std_data/words.dat' into table t1;
|
||||
--replace_result $MYSQLTEST_VARDIR MYSQLTEST_VARDIR
|
||||
eval load data infile '$MYSQLTEST_VARDIR/std_data_ln/words.dat' into table t1;
|
||||
show status like "Qcache_queries_in_cache";
|
||||
select count(*) from t1;
|
||||
drop table t1;
|
||||
|
|
|
@ -307,22 +307,21 @@ drop table t1;
|
|||
create table t1 (id integer auto_increment unique,imagem LONGBLOB not null default '');
|
||||
insert into t1 (id) values (1);
|
||||
# We have to clean up the path in the results for safe comparison
|
||||
--replace_result $MYSQL_TEST_DIR ../..
|
||||
eval select
|
||||
charset(load_file('$MYSQL_TEST_DIR/std_data/words.dat')),
|
||||
collation(load_file('$MYSQL_TEST_DIR/std_data/words.dat')),
|
||||
coercibility(load_file('$MYSQL_TEST_DIR/std_data/words.dat'));
|
||||
--replace_result $MYSQL_TEST_DIR ../..
|
||||
eval explain extended select
|
||||
charset(load_file('$MYSQL_TEST_DIR/std_data/words.dat')),
|
||||
collation(load_file('$MYSQL_TEST_DIR/std_data/words.dat')),
|
||||
coercibility(load_file('$MYSQL_TEST_DIR/std_data/words.dat'));
|
||||
--replace_result $MYSQL_TEST_DIR ../..
|
||||
eval update t1 set imagem=load_file('$MYSQL_TEST_DIR/std_data/words.dat') where id=1;
|
||||
eval select
|
||||
charset(load_file('../std_data_ln/words.dat')),
|
||||
collation(load_file('../std_data_ln/words.dat')),
|
||||
coercibility(load_file('../std_data_ln/words.dat'));
|
||||
--replace_result $MYSQLTEST_VARDIR MYSQLTEST_VARDIR
|
||||
eval explain extended select
|
||||
charset(load_file('$MYSQLTEST_VARDIR/std_data_ln/words.dat')),
|
||||
collation(load_file('$MYSQLTEST_VARDIR/std_data_ln/words.dat')),
|
||||
coercibility(load_file('$MYSQLTEST_VARDIR/std_data_ln/words.dat'));
|
||||
--replace_result $MYSQLTEST_VARDIR MYSQLTEST_VARDIR
|
||||
eval update t1 set imagem=load_file('$MYSQLTEST_VARDIR/std_data_ln/words.dat') where id=1;
|
||||
select if(imagem is null, "ERROR", "OK"),length(imagem) from t1 where id = 1;
|
||||
drop table t1;
|
||||
--replace_result $MYSQL_TEST_DIR ../..
|
||||
eval create table t1 select load_file('$MYSQL_TEST_DIR/std_data/words.dat') l;
|
||||
--replace_result $MYSQLTEST_VARDIR MYSQLTEST_VARDIR
|
||||
eval create table t1 select load_file('$MYSQLTEST_VARDIR/std_data_ln/words.dat') l;
|
||||
# We mask out the Privileges column because it differs for embedded server
|
||||
--replace_column 8 #
|
||||
show full fields from t1;
|
||||
|
|
|
@ -2803,6 +2803,11 @@ String *Item_load_file::val_str(String *str)
|
|||
(void) fn_format(path, file_name->c_ptr(), mysql_real_data_home, "",
|
||||
MY_RELATIVE_PATH | MY_UNPACK_FILENAME);
|
||||
|
||||
/* Read only allowed from within dir specified by secure_file_priv */
|
||||
if (opt_secure_file_priv &&
|
||||
strncmp(opt_secure_file_priv, path, strlen(opt_secure_file_priv)))
|
||||
goto err;
|
||||
|
||||
if (!my_stat(path, &stat_info, MYF(0)))
|
||||
goto err;
|
||||
|
||||
|
|
|
@ -1604,6 +1604,7 @@ extern my_bool opt_slave_compressed_protocol, use_temp_pool;
|
|||
extern my_bool opt_readonly, lower_case_file_system;
|
||||
extern my_bool opt_enable_named_pipe, opt_sync_frm, opt_allow_suspicious_udfs;
|
||||
extern my_bool opt_secure_auth;
|
||||
extern char* opt_secure_file_priv;
|
||||
extern my_bool opt_log_slow_admin_statements;
|
||||
extern my_bool sp_automatic_privileges, opt_noacl;
|
||||
extern my_bool opt_old_style_user_limits, trust_function_creators;
|
||||
|
|
|
@ -430,6 +430,7 @@ extern enum ndb_distribution opt_ndb_distribution_id;
|
|||
my_bool opt_readonly, use_temp_pool, relay_log_purge;
|
||||
my_bool opt_sync_frm, opt_allow_suspicious_udfs;
|
||||
my_bool opt_secure_auth= 0;
|
||||
char* opt_secure_file_priv= 0;
|
||||
my_bool opt_log_slow_admin_statements= 0;
|
||||
my_bool lower_case_file_system= 0;
|
||||
my_bool opt_large_pages= 0;
|
||||
|
@ -1233,6 +1234,7 @@ void clean_up(bool print_message)
|
|||
#endif
|
||||
x_free(opt_bin_logname);
|
||||
x_free(opt_relay_logname);
|
||||
x_free(opt_secure_file_priv);
|
||||
bitmap_free(&temp_pool);
|
||||
free_max_user_conn();
|
||||
#ifdef HAVE_REPLICATION
|
||||
|
@ -4895,7 +4897,8 @@ enum options_mysqld
|
|||
OPT_GENERAL_LOG,
|
||||
OPT_SLOW_LOG,
|
||||
OPT_MERGE,
|
||||
OPT_INNODB_ROLLBACK_ON_TIMEOUT
|
||||
OPT_INNODB_ROLLBACK_ON_TIMEOUT,
|
||||
OPT_SECURE_FILE_PRIV
|
||||
};
|
||||
|
||||
|
||||
|
@ -5598,6 +5601,10 @@ Can't be set to 1 if --log-slave-updates is used.",
|
|||
{"secure-auth", OPT_SECURE_AUTH, "Disallow authentication for accounts that have old (pre-4.1) passwords.",
|
||||
(gptr*) &opt_secure_auth, (gptr*) &opt_secure_auth, 0, GET_BOOL, NO_ARG,
|
||||
my_bool(0), 0, 0, 0, 0, 0},
|
||||
{"secure-file-priv", OPT_SECURE_FILE_PRIV,
|
||||
"Limit LOAD DATA, SELECT ... OUTFILE, and LOAD_FILE() to files within specified directory",
|
||||
(gptr*) &opt_secure_file_priv, (gptr*) &opt_secure_file_priv, 0,
|
||||
GET_STR_ALLOC, REQUIRED_ARG, 0, 0, 0, 0, 0, 0},
|
||||
{"server-id", OPT_SERVER_ID,
|
||||
"Uniquely identifies the server instance in the community of replication partners.",
|
||||
(gptr*) &server_id, (gptr*) &server_id, 0, GET_ULONG, REQUIRED_ARG, 0, 0, 0,
|
||||
|
@ -6964,6 +6971,7 @@ static void mysql_init_variables(void)
|
|||
opt_logname= opt_update_logname= opt_binlog_index_name= opt_slow_logname= 0;
|
||||
opt_tc_log_file= (char *)"tc.log"; // no hostname in tc_log file name !
|
||||
opt_secure_auth= 0;
|
||||
opt_secure_file_priv= 0;
|
||||
opt_bootstrap= opt_myisam_log= 0;
|
||||
mqh_used= 0;
|
||||
segfaulted= kill_in_progress= 0;
|
||||
|
@ -7984,6 +7992,16 @@ static void fix_paths(void)
|
|||
exit(1);
|
||||
}
|
||||
#endif /* HAVE_REPLICATION */
|
||||
/*
|
||||
Convert the secure-file-priv option to system format, allowing
|
||||
a quick strcmp to check if read or write is in an allowed dir
|
||||
*/
|
||||
if (opt_secure_file_priv)
|
||||
{
|
||||
convert_dirname(buff, opt_secure_file_priv, NullS);
|
||||
my_free(opt_secure_file_priv, MYF(0));
|
||||
opt_secure_file_priv= my_strdup(buff, MYF(MY_FAE));
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
|
|
@ -411,6 +411,8 @@ sys_query_cache_wlock_invalidate("query_cache_wlock_invalidate",
|
|||
&SV::query_cache_wlock_invalidate);
|
||||
#endif /* HAVE_QUERY_CACHE */
|
||||
sys_var_bool_ptr sys_secure_auth("secure_auth", &opt_secure_auth);
|
||||
sys_var_const_str_ptr sys_secure_file_priv("secure_file_priv",
|
||||
&opt_secure_file_priv);
|
||||
sys_var_long_ptr sys_server_id("server_id", &server_id, fix_server_id);
|
||||
sys_var_bool_ptr sys_slave_compressed_protocol("slave_compressed_protocol",
|
||||
&opt_slave_compressed_protocol);
|
||||
|
@ -669,7 +671,6 @@ sys_var_have_variable sys_have_rtree_keys("have_rtree_keys", &have_rtree_keys);
|
|||
sys_var_have_variable sys_have_symlink("have_symlink", &have_symlink);
|
||||
/* Global read-only variable describing server license */
|
||||
sys_var_const_str sys_license("license", STRINGIFY_ARG(LICENSE));
|
||||
|
||||
/* Global variables which enable|disable logging */
|
||||
sys_var_log_state sys_var_general_log("general_log", &opt_log,
|
||||
QUERY_LOG_GENERAL);
|
||||
|
@ -959,6 +960,7 @@ SHOW_VAR init_vars[]= {
|
|||
#endif
|
||||
{sys_rpl_recovery_rank.name,(char*) &sys_rpl_recovery_rank, SHOW_SYS},
|
||||
{"secure_auth", (char*) &sys_secure_auth, SHOW_SYS},
|
||||
{"secure_file_priv", (char*) &sys_secure_file_priv, SHOW_SYS},
|
||||
#ifdef HAVE_SMEM
|
||||
{"shared_memory", (char*) &opt_enable_shared_memory, SHOW_MY_BOOL},
|
||||
{"shared_memory_base_name", (char*) &shared_memory_base_name, SHOW_CHAR_PTR},
|
||||
|
|
|
@ -1179,7 +1179,7 @@ static File create_file(THD *thd, char *path, sql_exchange *exchange,
|
|||
IO_CACHE *cache)
|
||||
{
|
||||
File file;
|
||||
uint option= MY_UNPACK_FILENAME;
|
||||
uint option= MY_UNPACK_FILENAME | MY_RELATIVE_PATH;
|
||||
|
||||
#ifdef DONT_ALLOW_FULL_LOAD_DATA_PATHS
|
||||
option|= MY_REPLACE_DIR; // Force use of db directory
|
||||
|
@ -1193,7 +1193,15 @@ static File create_file(THD *thd, char *path, sql_exchange *exchange,
|
|||
}
|
||||
else
|
||||
(void) fn_format(path, exchange->file_name, mysql_real_data_home, "", option);
|
||||
|
||||
|
||||
if (opt_secure_file_priv &&
|
||||
strncmp(opt_secure_file_priv, path, strlen(opt_secure_file_priv)))
|
||||
{
|
||||
/* Write only allowed to dir or subdir specified by secure_file_priv */
|
||||
my_error(ER_OPTION_PREVENTS_STATEMENT, MYF(0), "--secure-file-priv");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (!access(path, F_OK))
|
||||
{
|
||||
my_error(ER_FILE_EXISTS_ERROR, MYF(0), exchange->file_name);
|
||||
|
|
|
@ -1640,7 +1640,7 @@ public:
|
|||
|
||||
|
||||
/*
|
||||
Used to hold information about file and file structure in exchainge
|
||||
Used to hold information about file and file structure in exchange
|
||||
via non-DB file (...INTO OUTFILE..., ...LOAD DATA...)
|
||||
XXX: We never call destructor for objects of this class.
|
||||
*/
|
||||
|
|
|
@ -305,6 +305,15 @@ bool mysql_load(THD *thd,sql_exchange *ex,TABLE_LIST *table_list,
|
|||
if ((stat_info.st_mode & S_IFIFO) == S_IFIFO)
|
||||
is_fifo = 1;
|
||||
#endif
|
||||
|
||||
if (opt_secure_file_priv &&
|
||||
strncmp(opt_secure_file_priv, name, strlen(opt_secure_file_priv)))
|
||||
{
|
||||
/* Read only allowed from within dir specified by secure_file_priv */
|
||||
my_error(ER_OPTION_PREVENTS_STATEMENT, MYF(0), "--secure-file-priv");
|
||||
DBUG_RETURN(TRUE);
|
||||
}
|
||||
|
||||
}
|
||||
if ((file=my_open(name,O_RDONLY,MYF(MY_WME))) < 0)
|
||||
DBUG_RETURN(TRUE);
|
||||
|
|
Loading…
Reference in a new issue