bolu61
Remove all blank lines
d9fff1e unverified
travis_fold:start:worker_info
Worker information
hostname: f29795e9-fe24-4ee1-8d98-4a92f81843f8@1.i-0214da0-production-2-worker-org-ec2.travisci.net
version: v3.8.2 https://github.com/travis-ci/worker/tree/c370f713bb4195cce20cdc6ce3e62f26b8cf3961
instance: 0d64bc6 travisci/ci-amethyst:packer-1512508255-986baf0 (via amqp)
startup: 427.380851ms
travis_fold:end:worker_info
travis_fold:start:system_info
Build system information
Build language: perl
Build group: stable
Build dist: trusty
Build id: 400483306
Job id: 400483307
Runtime kernel version: 4.14.12-041412-generic
travis-build version: db9c557a0
Build image provisioning date and time
Tue Dec 5 21:48:10 UTC 2017
Operating System Details
Distributor ID: Ubuntu
Description: Ubuntu 14.04.5 LTS
Release: 14.04
Codename: trusty
Cookbooks Version
7c2c6a6 https://github.com/travis-ci/travis-cookbooks/tree/7c2c6a6
git version
git version 2.15.1
bash version
GNU bash, version 4.3.11(1)-release (x86_64-pc-linux-gnu)
gcc version
gcc (Ubuntu 4.8.4-2ubuntu1~14.04.3) 4.8.4
Copyright (C) 2013 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
docker version
Client:
Version: 17.09.0-ce
API version: 1.32
Go version: go1.8.3
Git commit: afdb6d4
Built: Tue Sep 26 22:39:28 2017
OS/Arch: linux/amd64
clang version
clang version 5.0.0 (tags/RELEASE_500/final)
Target: x86_64-unknown-linux-gnu
Thread model: posix
InstalledDir: /usr/local/clang-5.0.0/bin
jq version
jq-1.5
bats version
Bats 0.4.0
shellcheck version
0.4.6
shfmt version
v2.0.0
ccache version
ccache version 3.1.9
Copyright (C) 2002-2007 Andrew Tridgell
Copyright (C) 2009-2011 Joel Rosdahl
This program is free software; you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by the Free Software
Foundation; either version 3 of the License, or (at your option) any later
version.
cmake version
cmake version 3.9.2
CMake suite maintained and supported by Kitware (kitware.com/cmake).
heroku version
heroku-cli/6.14.39-addc925 (linux-x64) node-v9.2.0
imagemagick version
Version: ImageMagick 6.7.7-10 2017-07-31 Q16 http://www.imagemagick.org
md5deep version
4.2
mercurial version
Mercurial Distributed SCM (version 4.2.2)
(see https://mercurial-scm.org for more information)
Copyright (C) 2005-2017 Matt Mackall and others
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
mysql version
mysql Ver 14.14 Distrib 5.6.33, for debian-linux-gnu (x86_64) using EditLine wrapper
openssl version
OpenSSL 1.0.1f 6 Jan 2014
packer version
Packer v1.0.2
Your version of Packer is out of date! The latest version
is 1.1.2. You can update by downloading from www.packer.io
postgresql client version
psql (PostgreSQL) 9.6.6
ragel version
Ragel State Machine Compiler version 6.8 Feb 2013
Copyright (c) 2001-2009 by Adrian Thurston
subversion version
svn, version 1.8.8 (r1568071)
compiled Aug 10 2017, 17:20:39 on x86_64-pc-linux-gnu
Copyright (C) 2013 The Apache Software Foundation.
This software consists of contributions made by many people;
see the NOTICE file for more information.
Subversion is open source software, see http://subversion.apache.org/
The following repository access (RA) modules are available:
* ra_svn : Module for accessing a repository using the svn network protocol.
- with Cyrus SASL authentication
- handles 'svn' scheme
* ra_local : Module for accessing a repository on local disk.
- handles 'file' scheme
* ra_serf : Module for accessing a repository via WebDAV protocol using serf.
- using serf 1.3.3
- handles 'http' scheme
- handles 'https' scheme
sudo version
Sudo version 1.8.9p5
Configure options: --prefix=/usr -v --with-all-insults --with-pam --with-fqdn --with-logging=syslog --with-logfac=authpriv --with-env-editor --with-editor=/usr/bin/editor --with-timeout=15 --with-password-timeout=0 --with-passprompt=[sudo] password for %p: --without-lecture --with-tty-tickets --disable-root-mailer --enable-admin-flag --with-sendmail=/usr/sbin/sendmail --with-timedir=/var/lib/sudo --mandir=/usr/share/man --libexecdir=/usr/lib/sudo --with-sssd --with-sssd-lib=/usr/lib/x86_64-linux-gnu --with-selinux
Sudoers policy plugin version 1.8.9p5
Sudoers file grammar version 43
Sudoers path: /etc/sudoers
Authentication methods: 'pam'
Syslog facility if syslog is being used for logging: authpriv
Syslog priority to use when user authenticates successfully: notice
Syslog priority to use when user authenticates unsuccessfully: alert
Send mail if the user is not in sudoers
Use a separate timestamp for each user/tty combo
Lecture user the first time they run sudo
Root may run sudo
Allow some information gathering to give useful error messages
Require fully-qualified hostnames in the sudoers file
Visudo will honor the EDITOR environment variable
Set the LOGNAME and USER environment variables
Length at which to wrap log file lines (0 for no wrap): 80
Authentication timestamp timeout: 15.0 minutes
Password prompt timeout: 0.0 minutes
Number of tries to enter a password: 3
Umask to use or 0777 to use user's: 022
Path to mail program: /usr/sbin/sendmail
Flags for mail program: -t
Address to send mail to: root
Subject line for mail messages: *** SECURITY information for %h ***
Incorrect password message: Sorry, try again.
Path to authentication timestamp dir: /var/lib/sudo
Default password prompt: [sudo] password for %p:
Default user to run commands as: root
Value to override user's $PATH with: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin
Path to the editor for use by visudo: /usr/bin/editor
When to require a password for 'list' pseudocommand: any
When to require a password for 'verify' pseudocommand: all
File descriptors >= 3 will be closed before executing a command
Environment variables to check for sanity:
TZ
TERM
LINGUAS
LC_*
LANGUAGE
LANG
COLORTERM
Environment variables to remove:
RUBYOPT
RUBYLIB
PYTHONUSERBASE
PYTHONINSPECT
PYTHONPATH
PYTHONHOME
TMPPREFIX
ZDOTDIR
READNULLCMD
NULLCMD
FPATH
PERL5DB
PERL5OPT
PERL5LIB
PERLLIB
PERLIO_DEBUG
JAVA_TOOL_OPTIONS
SHELLOPTS
GLOBIGNORE
PS4
BASH_ENV
ENV
TERMCAP
TERMPATH
TERMINFO_DIRS
TERMINFO
_RLD*
LD_*
PATH_LOCALE
NLSPATH
HOSTALIASES
RES_OPTIONS
LOCALDOMAIN
CDPATH
IFS
Environment variables to preserve:
JAVA_HOME
TRAVIS
CI
DEBIAN_FRONTEND
XAUTHORIZATION
XAUTHORITY
PS2
PS1
PATH
LS_COLORS
KRB5CCNAME
HOSTNAME
HOME
DISPLAY
COLORS
Locale to use while parsing sudoers: C
Directory in which to store input/output logs: /var/log/sudo-io
File in which to store the input/output log: %{seq}
Add an entry to the utmp/utmpx file when allocating a pty
PAM service name to use
PAM service name to use for login shells
Create a new PAM session for the command to run in
Maximum I/O log sequence number: 0
Local IP address and netmask pairs:
172.17.0.2/255.255.0.0
Sudoers I/O plugin version 1.8.9p5
gzip version
gzip 1.6
Copyright (C) 2007, 2010, 2011 Free Software Foundation, Inc.
Copyright (C) 1993 Jean-loup Gailly.
This is free software. You may redistribute copies of it under the terms of
the GNU General Public License <http://www.gnu.org/licenses/gpl.html>.
There is NO WARRANTY, to the extent permitted by law.
Written by Jean-loup Gailly.
zip version
Copyright (c) 1990-2008 Info-ZIP - Type 'zip "-L"' for software license.
This is Zip 3.0 (July 5th 2008), by Info-ZIP.
Currently maintained by E. Gordon. Please send bug reports to
the authors using the web page at www.info-zip.org; see README for details.
Latest sources and executables are at ftp://ftp.info-zip.org/pub/infozip,
as of above date; see http://www.info-zip.org/ for other sites.
Compiled with gcc 4.8.2 for Unix (Linux ELF) on Oct 21 2013.
Zip special compilation options:
USE_EF_UT_TIME (store Universal Time)
BZIP2_SUPPORT (bzip2 library version 1.0.6, 6-Sept-2010)
bzip2 code and library copyright (c) Julian R Seward
(See the bzip2 license for terms of use)
SYMLINK_SUPPORT (symbolic links supported)
LARGE_FILE_SUPPORT (can read and write large files on file system)
ZIP64_SUPPORT (use Zip64 to store large files in archives)
UNICODE_SUPPORT (store and read UTF-8 Unicode paths)
STORE_UNIX_UIDs_GIDs (store UID/GID sizes/values using new extra field)
UIDGID_NOT_16BIT (old Unix 16-bit UID/GID extra field not used)
[encryption, version 2.91 of 05 Jan 2007] (modified for Zip 3)
Encryption notice:
The encryption code of this program is not copyrighted and is
put in the public domain. It was originally written in Europe
and, to the best of our knowledge, can be freely distributed
in both source and object forms from any country, including
the USA under License Exception TSU of the U.S. Export
Administration Regulations (section 740.13(e)) of 6 June 2002.
Zip environment options:
ZIP: [none]
ZIPOPT: [none]
vim version
VIM - Vi IMproved 7.4 (2013 Aug 10, compiled Nov 24 2016 16:43:18)
Included patches: 1-52
Extra patches: 8.0.0056
Modified by [email protected]
Compiled by buildd@
Huge version without GUI. Features included (+) or not (-):
+acl +farsi +mouse_netterm +syntax
+arabic +file_in_path +mouse_sgr +tag_binary
+autocmd +find_in_path -mouse_sysmouse +tag_old_static
-balloon_eval +float +mouse_urxvt -tag_any_white
-browse +folding +mouse_xterm -tcl
++builtin_terms -footer +multi_byte +terminfo
+byte_offset +fork() +multi_lang +termresponse
+cindent +gettext -mzscheme +textobjects
-clientserver -hangul_input +netbeans_intg +title
-clipboard +iconv +path_extra -toolbar
+cmdline_compl +insert_expand -perl +user_commands
+cmdline_hist +jumplist +persistent_undo +vertsplit
+cmdline_info +keymap +postscript +virtualedit
+comments +langmap +printer +visual
+conceal +libcall +profile +visualextra
+cryptv +linebreak +python +viminfo
+cscope +lispindent -python3 +vreplace
+cursorbind +listcmds +quickfix +wildignore
+cursorshape +localmap +reltime +wildmenu
+dialog_con -lua +rightleft +windows
+diff +menu -ruby +writebackup
+digraphs +mksession +scrollbind -X11
-dnd +modify_fname +signs -xfontset
-ebcdic +mouse +smartindent -xim
+emacs_tags -mouseshape -sniff -xsmp
+eval +mouse_dec +startuptime -xterm_clipboard
+ex_extra +mouse_gpm +statusline -xterm_save
+extra_search -mouse_jsbterm -sun_workshop -xpm
system vimrc file: "$VIM/vimrc"
user vimrc file: "$HOME/.vimrc"
2nd user vimrc file: "~/.vim/vimrc"
user exrc file: "$HOME/.exrc"
fall-back for $VIM: "/usr/share/vim"
Compilation: gcc -c -I. -Iproto -DHAVE_CONFIG_H -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=1
Linking: gcc -Wl,-Bsymbolic-functions -Wl,-z,relro -Wl,--as-needed -o vim -lm -ltinfo -lnsl -lselinux -lacl -lattr -lgpm -ldl -L/usr/lib/python2.7/config-x86_64-linux-gnu -lpython2.7 -lpthread -ldl -lutil -lm -Xlinker -export-dynamic -Wl,-O1 -Wl,-Bsymbolic-functions
iptables version
iptables v1.4.21
curl version
curl 7.35.0 (x86_64-pc-linux-gnu) libcurl/7.35.0 OpenSSL/1.0.1f zlib/1.2.8 libidn/1.28 librtmp/2.3
wget version
GNU Wget 1.15 built on linux-gnu.
rsync version
rsync version 3.1.0 protocol version 31
gimme version
v1.2.0
nvm version
0.33.6
perlbrew version
/home/travis/perl5/perlbrew/bin/perlbrew - App::perlbrew/0.80
phpenv version
rbenv 1.1.1-25-g6aa70b6
rvm version
rvm 1.29.3 (latest) by Michal Papis, Piotr Kuczynski, Wayne E. Seguin [https://rvm.io]
default ruby version
ruby 2.4.1p111 (2017-03-22 revision 58053) [x86_64-linux]
CouchDB version
couchdb 1.6.1
ElasticSearch version
5.5.0
Installed Firefox version
firefox 56.0.2
MongoDB version
MongoDB 3.4.10
PhantomJS version
2.1.1
Pre-installed PostgreSQL versions
9.2.24
9.3.20
9.4.15
9.5.10
9.6.6
RabbitMQ Version
3.6.14
Redis version
redis-server 4.0.6
riak version
2.2.3
kerl list installations
19.0
18.3
kiex list
kiex elixirs
elixir-1.2.6
=* elixir-1.3.2
# => - current
# =* - current && default
# * - default
rebar --version
rebar 2.6.4 17 20160831_145136 git 2.6.4-dirty
perlbrew list
5.22 (5.22.0)
5.22.0
5.22-extras (5.22.4)
5.22-shrplib (5.22.4)
5.22.4
5.24 (5.24.0)
5.24.0
5.24-extras (5.24.3)
5.24-shrplib (5.24.3)
5.24.3
travis_fold:end:system_info
Network availability confirmed.
travis_fold:start:git.checkout
travis_time:start:1f0e4c4a
$ git clone --depth=50 https://github.com/major/MySQLTuner-perl.git major/MySQLTuner-perl
Cloning into 'major/MySQLTuner-perl'...
remote: Counting objects: 668, done.
remote: Compressing objects: 0% (1/319)
remote: Compressing objects: 1% (4/319)
remote: Compressing objects: 2% (7/319)
remote: Compressing objects: 3% (10/319)
remote: Compressing objects: 4% (13/319)
remote: Compressing objects: 5% (16/319)
remote: Compressing objects: 6% (20/319)
remote: Compressing objects: 7% (23/319)
remote: Compressing objects: 8% (26/319)
remote: Compressing objects: 9% (29/319)
remote: Compressing objects: 10% (32/319)
remote: Compressing objects: 11% (36/319)
remote: Compressing objects: 12% (39/319)
remote: Compressing objects: 13% (42/319)
remote: Compressing objects: 14% (45/319)
remote: Compressing objects: 15% (48/319)
remote: Compressing objects: 16% (52/319)
remote: Compressing objects: 17% (55/319)
remote: Compressing objects: 18% (58/319)
remote: Compressing objects: 19% (61/319)
remote: Compressing objects: 20% (64/319)
remote: Compressing objects: 21% (67/319)
remote: Compressing objects: 22% (71/319)
remote: Compressing objects: 23% (74/319)
remote: Compressing objects: 24% (77/319)
remote: Compressing objects: 25% (80/319)
remote: Compressing objects: 26% (83/319)
remote: Compressing objects: 27% (87/319)
remote: Compressing objects: 28% (90/319)
remote: Compressing objects: 29% (93/319)
remote: Compressing objects: 30% (96/319)
remote: Compressing objects: 31% (99/319)
remote: Compressing objects: 32% (103/319)
remote: Compressing objects: 33% (106/319)
remote: Compressing objects: 34% (109/319)
remote: Compressing objects: 35% (112/319)
remote: Compressing objects: 36% (115/319)
remote: Compressing objects: 37% (119/319)
remote: Compressing objects: 38% (122/319)
remote: Compressing objects: 39% (125/319)
remote: Compressing objects: 40% (128/319)
remote: Compressing objects: 41% (131/319)
remote: Compressing objects: 42% (134/319)
remote: Compressing objects: 43% (138/319)
remote: Compressing objects: 44% (141/319)
remote: Compressing objects: 45% (144/319)
remote: Compressing objects: 46% (147/319)
remote: Compressing objects: 47% (150/319)
remote: Compressing objects: 48% (154/319)
remote: Compressing objects: 49% (157/319)
remote: Compressing objects: 50% (160/319)
remote: Compressing objects: 51% (163/319)
remote: Compressing objects: 52% (166/319)
remote: Compressing objects: 53% (170/319)
remote: Compressing objects: 54% (173/319)
remote: Compressing objects: 55% (176/319)
remote: Compressing objects: 56% (179/319)
remote: Compressing objects: 57% (182/319)
remote: Compressing objects: 58% (186/319)
remote: Compressing objects: 59% (189/319)
remote: Compressing objects: 60% (192/319)
remote: Compressing objects: 61% (195/319)
remote: Compressing objects: 62% (198/319)
remote: Compressing objects: 63% (201/319)
remote: Compressing objects: 64% (205/319)
remote: Compressing objects: 65% (208/319)
remote: Compressing objects: 66% (211/319)
remote: Compressing objects: 67% (214/319)
remote: Compressing objects: 68% (217/319)
remote: Compressing objects: 69% (221/319)
remote: Compressing objects: 70% (224/319)
remote: Compressing objects: 71% (227/319)
remote: Compressing objects: 72% (230/319)
remote: Compressing objects: 73% (233/319)
remote: Compressing objects: 74% (237/319)
remote: Compressing objects: 75% (240/319)
remote: Compressing objects: 76% (243/319)
remote: Compressing objects: 77% (246/319)
remote: Compressing objects: 78% (249/319)
remote: Compressing objects: 79% (253/319)
remote: Compressing objects: 80% (256/319)
remote: Compressing objects: 81% (259/319)
remote: Compressing objects: 82% (262/319)
remote: Compressing objects: 83% (265/319)
remote: Compressing objects: 84% (268/319)
remote: Compressing objects: 85% (272/319)
remote: Compressing objects: 86% (275/319)
remote: Compressing objects: 87% (278/319)
remote: Compressing objects: 88% (281/319)
remote: Compressing objects: 89% (284/319)
remote: Compressing objects: 90% (288/319)
remote: Compressing objects: 91% (291/319)
remote: Compressing objects: 92% (294/319)
remote: Compressing objects: 93% (297/319)
remote: Compressing objects: 94% (300/319)
remote: Compressing objects: 95% (304/319)
remote: Compressing objects: 96% (307/319)
remote: Compressing objects: 97% (310/319)
remote: Compressing objects: 98% (313/319)
remote: Compressing objects: 99% (316/319)
remote: Compressing objects: 100% (319/319)
remote: Compressing objects: 100% (319/319), done.
Receiving objects: 0% (1/668)
Receiving objects: 1% (7/668)
Receiving objects: 2% (14/668)
Receiving objects: 3% (21/668)
Receiving objects: 4% (27/668)
Receiving objects: 5% (34/668)
Receiving objects: 6% (41/668)
Receiving objects: 7% (47/668)
Receiving objects: 8% (54/668)
Receiving objects: 9% (61/668)
Receiving objects: 10% (67/668)
Receiving objects: 11% (74/668)
Receiving objects: 12% (81/668)
Receiving objects: 13% (87/668)
Receiving objects: 14% (94/668)
Receiving objects: 15% (101/668)
Receiving objects: 16% (107/668)
Receiving objects: 17% (114/668)
Receiving objects: 18% (121/668)
Receiving objects: 19% (127/668)
Receiving objects: 20% (134/668)
Receiving objects: 21% (141/668)
Receiving objects: 22% (147/668)
Receiving objects: 23% (154/668)
Receiving objects: 24% (161/668)
Receiving objects: 25% (167/668)
Receiving objects: 26% (174/668)
Receiving objects: 27% (181/668)
Receiving objects: 28% (188/668)
Receiving objects: 29% (194/668)
Receiving objects: 30% (201/668)
Receiving objects: 31% (208/668)
Receiving objects: 32% (214/668)
Receiving objects: 33% (221/668)
Receiving objects: 34% (228/668)
Receiving objects: 35% (234/668)
Receiving objects: 36% (241/668)
Receiving objects: 37% (248/668)
Receiving objects: 38% (254/668)
Receiving objects: 39% (261/668)
Receiving objects: 40% (268/668)
Receiving objects: 41% (274/668)
Receiving objects: 42% (281/668)
Receiving objects: 43% (288/668)
Receiving objects: 44% (294/668)
Receiving objects: 45% (301/668)
Receiving objects: 46% (308/668)
Receiving objects: 47% (314/668)
Receiving objects: 48% (321/668)
Receiving objects: 49% (328/668)
Receiving objects: 50% (334/668)
Receiving objects: 51% (341/668)
Receiving objects: 52% (348/668)
Receiving objects: 53% (355/668)
Receiving objects: 54% (361/668)
Receiving objects: 55% (368/668)
Receiving objects: 56% (375/668)
Receiving objects: 57% (381/668)
Receiving objects: 58% (388/668)
Receiving objects: 59% (395/668)
Receiving objects: 60% (401/668)
Receiving objects: 61% (408/668)
Receiving objects: 62% (415/668)
Receiving objects: 63% (421/668)
Receiving objects: 64% (428/668)
Receiving objects: 65% (435/668)
Receiving objects: 66% (441/668)
Receiving objects: 67% (448/668)
Receiving objects: 68% (455/668)
Receiving objects: 69% (461/668)
Receiving objects: 70% (468/668)
Receiving objects: 71% (475/668)
Receiving objects: 72% (481/668)
Receiving objects: 73% (488/668)
Receiving objects: 74% (495/668)
Receiving objects: 75% (501/668)
Receiving objects: 76% (508/668)
Receiving objects: 77% (515/668)
Receiving objects: 78% (522/668)
Receiving objects: 79% (528/668)
Receiving objects: 80% (535/668)
Receiving objects: 81% (542/668)
Receiving objects: 82% (548/668)
Receiving objects: 83% (555/668)
Receiving objects: 84% (562/668)
Receiving objects: 85% (568/668)
Receiving objects: 86% (575/668)
Receiving objects: 87% (582/668)
Receiving objects: 88% (588/668)
Receiving objects: 89% (595/668)
Receiving objects: 90% (602/668)
Receiving objects: 91% (608/668)
Receiving objects: 92% (615/668)
Receiving objects: 93% (622/668)
Receiving objects: 94% (628/668)
Receiving objects: 95% (635/668)
Receiving objects: 96% (642/668)
Receiving objects: 97% (648/668)
Receiving objects: 98% (655/668)
remote: Total 668 (delta 422), reused 586 (delta 349), pack-reused 0
Receiving objects: 99% (662/668)
Receiving objects: 100% (668/668)
Receiving objects: 100% (668/668), 470.76 KiB | 8.56 MiB/s, done.
Resolving deltas: 0% (0/422)
Resolving deltas: 31% (135/422)
Resolving deltas: 32% (137/422)
Resolving deltas: 39% (166/422)
Resolving deltas: 41% (175/422)
Resolving deltas: 42% (180/422)
Resolving deltas: 45% (191/422)
Resolving deltas: 48% (203/422)
Resolving deltas: 51% (216/422)
Resolving deltas: 52% (220/422)
Resolving deltas: 53% (227/422)
Resolving deltas: 54% (230/422)
Resolving deltas: 56% (237/422)
Resolving deltas: 60% (255/422)
Resolving deltas: 64% (271/422)
Resolving deltas: 71% (301/422)
Resolving deltas: 83% (353/422)
Resolving deltas: 100% (422/422)
Resolving deltas: 100% (422/422), done.
travis_time:end:1f0e4c4a:start=1530803312410616968,finish=1530803313067506954,duration=656889986
$ cd major/MySQLTuner-perl
travis_time:start:19a02b78
$ git fetch origin +refs/pull/388/merge:
remote: Counting objects: 4, done.
remote: Compressing objects: 25% (1/4)
remote: Compressing objects: 50% (2/4)
remote: Compressing objects: 75% (3/4)
remote: Compressing objects: 100% (4/4)
remote: Compressing objects: 100% (4/4), done.
remote: Total 4 (delta 2), reused 0 (delta 0), pack-reused 0
Unpacking objects: 25% (1/4)
Unpacking objects: 50% (2/4)
Unpacking objects: 75% (3/4)
Unpacking objects: 100% (4/4)
Unpacking objects: 100% (4/4), done.
From https://github.com/major/MySQLTuner-perl
* branch refs/pull/388/merge -> FETCH_HEAD
travis_time:end:19a02b78:start=1530803313073164067,finish=1530803313321172836,duration=248008769
$ git checkout -qf FETCH_HEAD
travis_fold:end:git.checkout
travis_time:start:046be4cd
$ perlbrew use 5.24
travis_time:end:046be4cd:start=1530803313344965049,finish=1530803313411825166,duration=66860117
$ perl --version
This is perl 5, version 24, subversion 0 (v5.24.0) built for x86_64-linux
(with 1 registered patch, see perl -V for more detail)
Copyright 1987-2016, Larry Wall
Perl may be copied only under the terms of either the Artistic License or the
GNU General Public License, which may be found in the Perl 5 source kit.
Complete documentation for Perl, including FAQ lists, should be found on
this system using "man perl" or "perldoc perl". If you have access to the
Internet, point your browser at http://www.perl.org/, the Perl Home Page.
$ cpanm --version
cpanm (App::cpanminus) version 1.7043 (/home/travis/perl5/perlbrew/bin/cpanm)
perl version 5.024000 (/home/travis/perl5/perlbrew/perls/5.24.0/bin/perl)
%Config:
archname=x86_64-linux
installsitelib=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0
installsitebin=/home/travis/perl5/perlbrew/perls/5.24.0/bin
installman1dir=/home/travis/perl5/perlbrew/perls/5.24.0/man/man1
installman3dir=/home/travis/perl5/perlbrew/perls/5.24.0/man/man3
sitearchexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux
sitelibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0
archlibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux
privlibexp=/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0
%ENV:
PERLBREW_BASHRC_VERSION=0.80
PERLBREW_HOME=/home/travis/.perlbrew
PERLBREW_MANPATH=/home/travis/perl5/perlbrew/perls/5.24/man
PERLBREW_PATH=/home/travis/perl5/perlbrew/bin:/home/travis/perl5/perlbrew/perls/5.24/bin
PERLBREW_PERL=5.24
PERLBREW_ROOT=/home/travis/perl5/perlbrew
PERLBREW_VERSION=0.80
@INC:
FatPacked::23508240=HASH(0x166b510)
/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux
/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0
/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux
/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0
.
travis_fold:start:before_install.1
travis_time:start:2362e04e
$ git clone git://github.com/haarg/perl-travis-helper
Cloning into 'perl-travis-helper'...
remote: Counting objects: 1065, done.
remote: Compressing objects: 25% (1/4)
remote: Compressing objects: 50% (2/4)
remote: Compressing objects: 75% (3/4)
remote: Compressing objects: 100% (4/4)
remote: Compressing objects: 100% (4/4), done.
Receiving objects: 0% (1/1065)
Receiving objects: 1% (11/1065)
Receiving objects: 2% (22/1065)
Receiving objects: 3% (32/1065)
Receiving objects: 4% (43/1065)
Receiving objects: 5% (54/1065)
Receiving objects: 6% (64/1065)
Receiving objects: 7% (75/1065)
Receiving objects: 8% (86/1065)
Receiving objects: 9% (96/1065)
Receiving objects: 10% (107/1065)
Receiving objects: 11% (118/1065)
Receiving objects: 12% (128/1065)
Receiving objects: 13% (139/1065)
Receiving objects: 14% (150/1065)
Receiving objects: 15% (160/1065)
Receiving objects: 16% (171/1065)
Receiving objects: 17% (182/1065)
Receiving objects: 18% (192/1065)
Receiving objects: 19% (203/1065)
Receiving objects: 20% (213/1065)
Receiving objects: 21% (224/1065)
Receiving objects: 22% (235/1065)
Receiving objects: 23% (245/1065)
Receiving objects: 24% (256/1065)
Receiving objects: 25% (267/1065)
Receiving objects: 26% (277/1065)
Receiving objects: 27% (288/1065)
Receiving objects: 28% (299/1065)
Receiving objects: 29% (309/1065)
Receiving objects: 30% (320/1065)
Receiving objects: 31% (331/1065)
Receiving objects: 32% (341/1065)
Receiving objects: 33% (352/1065)
Receiving objects: 34% (363/1065)
Receiving objects: 35% (373/1065)
Receiving objects: 36% (384/1065)
Receiving objects: 37% (395/1065)
Receiving objects: 38% (405/1065)
Receiving objects: 39% (416/1065)
Receiving objects: 40% (426/1065)
Receiving objects: 41% (437/1065)
Receiving objects: 42% (448/1065)
Receiving objects: 43% (458/1065)
Receiving objects: 44% (469/1065)
Receiving objects: 45% (480/1065)
Receiving objects: 46% (490/1065)
Receiving objects: 47% (501/1065)
Receiving objects: 48% (512/1065)
Receiving objects: 49% (522/1065)
Receiving objects: 50% (533/1065)
Receiving objects: 51% (544/1065)
Receiving objects: 52% (554/1065)
Receiving objects: 53% (565/1065)
Receiving objects: 54% (576/1065)
Receiving objects: 55% (586/1065)
Receiving objects: 56% (597/1065)
Receiving objects: 57% (608/1065)
Receiving objects: 58% (618/1065)
Receiving objects: 59% (629/1065)
Receiving objects: 60% (639/1065)
Receiving objects: 61% (650/1065)
Receiving objects: 62% (661/1065)
Receiving objects: 63% (671/1065)
Receiving objects: 64% (682/1065)
Receiving objects: 65% (693/1065)
Receiving objects: 66% (703/1065)
Receiving objects: 67% (714/1065)
Receiving objects: 68% (725/1065)
Receiving objects: 69% (735/1065)
Receiving objects: 70% (746/1065)
Receiving objects: 71% (757/1065)
Receiving objects: 72% (767/1065)
Receiving objects: 73% (778/1065)
Receiving objects: 74% (789/1065)
Receiving objects: 75% (799/1065)
remote: Total 1065 (delta 2), reused 6 (delta 2), pack-reused 1059
Receiving objects: 76% (810/1065)
Receiving objects: 77% (821/1065)
Receiving objects: 78% (831/1065)
Receiving objects: 79% (842/1065)
Receiving objects: 80% (852/1065)
Receiving objects: 81% (863/1065)
Receiving objects: 82% (874/1065)
Receiving objects: 83% (884/1065)
Receiving objects: 84% (895/1065)
Receiving objects: 85% (906/1065)
Receiving objects: 86% (916/1065)
Receiving objects: 87% (927/1065)
Receiving objects: 88% (938/1065)
Receiving objects: 89% (948/1065)
Receiving objects: 90% (959/1065)
Receiving objects: 91% (970/1065)
Receiving objects: 92% (980/1065)
Receiving objects: 93% (991/1065)
Receiving objects: 94% (1002/1065)
Receiving objects: 95% (1012/1065)
Receiving objects: 96% (1023/1065)
Receiving objects: 97% (1034/1065)
Receiving objects: 98% (1044/1065)
Receiving objects: 99% (1055/1065)
Receiving objects: 100% (1065/1065)
Receiving objects: 100% (1065/1065), 176.28 KiB | 14.69 MiB/s, done.
Resolving deltas: 0% (0/653)
Resolving deltas: 1% (7/653)
Resolving deltas: 2% (17/653)
Resolving deltas: 5% (38/653)
Resolving deltas: 7% (50/653)
Resolving deltas: 8% (54/653)
Resolving deltas: 10% (70/653)
Resolving deltas: 12% (80/653)
Resolving deltas: 14% (94/653)
Resolving deltas: 16% (109/653)
Resolving deltas: 17% (114/653)
Resolving deltas: 18% (123/653)
Resolving deltas: 20% (133/653)
Resolving deltas: 21% (140/653)
Resolving deltas: 22% (144/653)
Resolving deltas: 23% (151/653)
Resolving deltas: 24% (158/653)
Resolving deltas: 25% (169/653)
Resolving deltas: 26% (173/653)
Resolving deltas: 29% (191/653)
Resolving deltas: 34% (225/653)
Resolving deltas: 39% (261/653)
Resolving deltas: 40% (262/653)
Resolving deltas: 41% (268/653)
Resolving deltas: 43% (283/653)
Resolving deltas: 45% (296/653)
Resolving deltas: 46% (306/653)
Resolving deltas: 48% (316/653)
Resolving deltas: 53% (349/653)
Resolving deltas: 61% (402/653)
Resolving deltas: 66% (435/653)
Resolving deltas: 69% (454/653)
Resolving deltas: 71% (469/653)
Resolving deltas: 74% (485/653)
Resolving deltas: 75% (496/653)
Resolving deltas: 76% (497/653)
Resolving deltas: 77% (504/653)
Resolving deltas: 78% (515/653)
Resolving deltas: 79% (518/653)
Resolving deltas: 82% (540/653)
Resolving deltas: 83% (543/653)
Resolving deltas: 84% (553/653)
Resolving deltas: 87% (572/653)
Resolving deltas: 88% (580/653)
Resolving deltas: 89% (587/653)
Resolving deltas: 92% (601/653)
Resolving deltas: 95% (622/653)
Resolving deltas: 96% (632/653)
Resolving deltas: 97% (637/653)
Resolving deltas: 98% (642/653)
Resolving deltas: 99% (647/653)
Resolving deltas: 100% (653/653)
Resolving deltas: 100% (653/653), done.
travis_time:end:2362e04e:start=1530803313588323611,finish=1530803313731443001,duration=143119390
travis_fold:end:before_install.1
travis_fold:start:before_install.2
travis_time:start:0963b424
$ source perl-travis-helper/init
Perl Travis Helpers: heads/master-0-gcde9ab6
travis_time:end:0963b424:start=1530803313737012285,finish=1530803313879946625,duration=142934340
travis_fold:end:before_install.2
travis_fold:start:before_install.3
travis_time:start:0be148a0
$ build-perl
Perl 5.24 already installed.
travis_time:end:0be148a0:start=1530803313886209346,finish=1530803314595103947,duration=708894601
travis_fold:end:before_install.3
travis_fold:start:before_install.4
travis_time:start:03ff43ec
$ perl -V
Summary of my perl5 (revision 5 version 24 subversion 0) configuration:
Platform:
osname=linux, osvers=4.4.0-93-generic, archname=x86_64-linux
uname='linux travis-job-282a49a7-d5d1-4e5b-a870-68df9527dd24 4.4.0-93-generic #116~14.04.1-ubuntu smp mon aug 14 16:07:05 utc 2017 x86_64 x86_64 x86_64 gnulinux '
config_args='-de -Dprefix=/home/travis/perl5/perlbrew/perls/5.24.0 -Aeval:scriptdir=/home/travis/perl5/perlbrew/perls/5.24.0/bin'
hint=recommended, useposix=true, d_sigaction=define
useithreads=undef, usemultiplicity=undef
use64bitint=define, use64bitall=define, uselongdouble=undef
usemymalloc=n, bincompat5005=undef
Compiler:
cc='cc', ccflags ='-fwrapv -fno-strict-aliasing -pipe -fstack-protector -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64',
optimize='-O2',
cppflags='-fwrapv -fno-strict-aliasing -pipe -fstack-protector -I/usr/local/include'
ccversion='', gccversion='4.8.4', gccosandvers=''
intsize=4, longsize=8, ptrsize=8, doublesize=8, byteorder=12345678, doublekind=3
d_longlong=define, longlongsize=8, d_longdbl=define, longdblsize=16, longdblkind=3
ivtype='long', ivsize=8, nvtype='double', nvsize=8, Off_t='off_t', lseeksize=8
alignbytes=8, prototype=define
Linker and Libraries:
ld='cc', ldflags =' -fstack-protector -L/usr/local/lib'
libpth=/usr/local/lib /usr/lib/gcc/x86_64-linux-gnu/4.8/include-fixed /usr/include/x86_64-linux-gnu /usr/lib /lib/x86_64-linux-gnu /lib/../lib /usr/lib/x86_64-linux-gnu /usr/lib/../lib /lib
libs=-lpthread -lnsl -lgdbm -ldl -lm -lcrypt -lutil -lc -lgdbm_compat
perllibs=-lpthread -lnsl -ldl -lm -lcrypt -lutil -lc
libc=libc-2.19.so, so=so, useshrplib=false, libperl=libperl.a
gnulibc_version='2.19'
Dynamic Linking:
dlsrc=dl_dlopen.xs, dlext=so, d_dlsymun=undef, ccdlflags='-Wl,-E'
cccdlflags='-fPIC', lddlflags='-shared -O2 -L/usr/local/lib -fstack-protector'
Characteristics of this binary (from libperl):
Compile-time options: HAS_TIMES PERLIO_LAYERS PERL_COPY_ON_WRITE
PERL_DONT_CREATE_GVSV
PERL_HASH_FUNC_ONE_AT_A_TIME_HARD PERL_MALLOC_WRAP
PERL_PRESERVE_IVUV USE_64_BIT_ALL USE_64_BIT_INT
USE_LARGE_FILES USE_LOCALE USE_LOCALE_COLLATE
USE_LOCALE_CTYPE USE_LOCALE_NUMERIC USE_LOCALE_TIME
USE_PERLIO USE_PERL_ATOF
Locally applied patches:
Devel::PatchPerl 1.48
Built under linux
Compiled at Nov 14 2017 02:21:16
%ENV:
PERLBREW_BASHRC_VERSION="0.80"
PERLBREW_HOME="/home/travis/.perlbrew"
PERLBREW_MANPATH="/home/travis/perl5/perlbrew/perls/5.24/man"
PERLBREW_PATH="/home/travis/perl5/perlbrew/bin:/home/travis/perl5/perlbrew/perls/5.24/bin"
PERLBREW_PERL="5.24"
PERLBREW_ROOT="/home/travis/perl5/perlbrew"
PERLBREW_VERSION="0.84"
PERL_AUTOINSTALL_PREFER_CPAN="1"
PERL_MM_USE_DEFAULT="1"
@INC:
/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/x86_64-linux
/home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0
/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0/x86_64-linux
/home/travis/perl5/perlbrew/perls/5.24.0/lib/5.24.0
.
travis_time:end:03ff43ec:start=1530803314601618931,finish=1530803314615809999,duration=14191068
travis_fold:end:before_install.4
travis_fold:start:install.1
travis_time:start:08515540
$ cpanm --quiet --notest Data::Dumper
Successfully installed Data-Dumper-2.161 (upgraded from 2.160)
1 distribution installed
travis_time:end:08515540:start=1530803314621657086,finish=1530803316662362905,duration=2040705819
travis_fold:end:install.1
travis_fold:start:install.2
travis_time:start:2d710aff
$ cpanm --quiet --notest JSON
Successfully installed JSON-2.97001
1 distribution installed
travis_time:end:2d710aff:start=1530803316668897047,finish=1530803318700125380,duration=2031228333
travis_fold:end:install.2
travis_fold:start:install.3
travis_time:start:07ba2b9c
$ cpanm --quiet --notest Perl::Critic
Successfully installed PPIx-QuoteLike-0.005
Successfully installed Readonly-2.05
Successfully installed PPIx-Utilities-1.001000
Successfully installed B-Keywords-1.18
Successfully installed Config-Tiny-2.23
Successfully installed PPIx-Regexp-0.060
Successfully installed Perl-Tidy-20180220
Successfully installed String-Format-1.18
Successfully installed Class-Tiny-1.006
Successfully installed Lingua-EN-Inflect-1.903
Successfully installed Pod-Spell-1.20
Successfully installed Perl-Critic-1.132
12 distributions installed
travis_time:end:07ba2b9c:start=1530803318707496528,finish=1530803334003931490,duration=15296434962
travis_fold:end:install.3
travis_fold:start:install.4
travis_time:start:1d465e20
$ cpanm --quiet --notest Text::Template
Successfully installed Text-Template-1.53 (upgraded from 1.47)
1 distribution installed
travis_time:end:1d465e20:start=1530803334010264450,finish=1530803335328135918,duration=1317871468
travis_fold:end:install.4
travis_fold:start:before_script.1
travis_time:start:0bf36686
$ echo -e "[client]\nuser=root\npassword=\"\"" > .my.cnf
travis_time:end:0bf36686:start=1530803335334810496,finish=1530803335340214032,duration=5403536
travis_fold:end:before_script.1
travis_fold:start:before_script.2
travis_time:start:1a503d80
$ chmod 600 .my.cnf
travis_time:end:1a503d80:start=1530803335346808654,finish=1530803335354350682,duration=7542028
travis_fold:end:before_script.2
travis_time:start:0e813900
$ perlcritic mysqltuner.pl
Having more than one /x regexp modifier is deprecated at /home/travis/perl5/perlbrew/perls/5.24.0/lib/site_perl/5.24.0/Perl/Critic/Policy/ValuesAndExpressions/RequireInterpolationOfMetachars.pm line 110.
Use IO::Interactive::is_interactive() instead of -t at line 69, column 28. See page 218 of PBP. (Severity: 5)
Use IO::Interactive::is_interactive() instead of -t at line 203, column 28. See page 218 of PBP. (Severity: 5)
travis_time:end:0e813900:start=1530803335361517841,finish=1530803339266991586,duration=3905473745
The command "perlcritic mysqltuner.pl" exited with 2.
travis_time:start:09832e48
$ ./mysqltuner.pl --idxstat --dbstat
>> MySQLTuner 1.7.9 - Major Hayden <[email protected]>
>> Bug reports, feature requests, and downloads at http://mysqltuner.com/
>> Run with '--help' for additional options and output filtering
[--] Skipped version check for MySQLTuner script
[OK] Currently running supported MySQL version 5.6.33-0ubuntu0.14.04.1
[OK] Operating on 64-bit architecture
-------- Log file Recommendations ------------------------------------------------------------------
[--] Log file: /var/lib/mysql/travis-job-major-mysqltuner-per-400483307.travisci.net.err(0B)
[!!] Log file /var/lib/mysql/travis-job-major-mysqltuner-per-400483307.travisci.net.err doesn't exist
[!!] Log file /var/lib/mysql/travis-job-major-mysqltuner-per-400483307.travisci.net.err isn't readable.
-------- Storage Engine Statistics -----------------------------------------------------------------
[--] Status: +ARCHIVE +BLACKHOLE +CSV -FEDERATED +InnoDB +MEMORY +MRG_MYISAM +MyISAM +PERFORMANCE_SCHEMA
[--] Data in InnoDB tables: 16.0K (Tables: 1)
[OK] Total fragmented tables: 0
-------- Database Metrics --------------------------------------------------------------------------
[--] There is 1 Database(s).
[--] All User Databases:
[--] +-- TABLE : 1
[--] +-- ROWS : 0
[--] +-- DATA : 16.0K(100.00%)
[--] +-- INDEX : 0B(0.00%)
[--] +-- SIZE : 16.0K
[--] +-- COLLA : 1 (utf8_general_ci, utf8_bin, latin1_swedish_ci)
[--] +-- ENGIN : 1 (MEMORY, MyISAM, CSV, InnoDB, PERFORMANCE_SCHEMA)
[--] Database: travis
[--] +-- TABLE: 1
[--] +-- COLL : 1 (latin1_swedish_ci)
[--] +-- ROWS : 0
[--] +-- DATA : 16.0K(100.00%)
[--] +-- INDEX: 0B(0.00%)
[--] +-- TOTAL: 16.0K
[--] +-- ENGIN : 1 (InnoDB)
[OK] 1 collation for travis database.
[OK] 1 engine for travis database.
[--] Charsets for travis database table column:
[OK] travis table column(s) has same charset defined for all text like column(s).
[--] Collations for travis database table column:
[OK] travis table column(s) has same collation defined for all text like column(s).
-------- Table Column Metrics ----------------------------------------------------------------------
[--] Database: travis
[--] +-- TABLE: test
[--] +-- Column test.id:
[--] Current Fieldtype: INT(11)
[--] Optimal Fieldtype: ENUM('4') NOT NULL
[!!] Consider changing type for column id in table travis.test
-------- Indexes Metrics ---------------------------------------------------------------------------
[--] Worst selectivity indexes:
-------- Security Recommendations ------------------------------------------------------------------
[OK] There are no anonymous accounts for any database users
[!!] User '[email protected]' has no password set.
[!!] User 'root@::1' has no password set.
[!!] User 'root@a5ca16b8c093' has no password set.
[!!] User 'root@localhost' has no password set.
[!!] User 'travis@%' has no password set.
[!!] User '[email protected]' has no password set.
[!!] User 'travis@localhost' has no password set.
[!!] User 'travis@%' does not specify hostname restrictions.
[--] There are 612 basic passwords in the list.
-------- CVE Security Recommendations --------------------------------------------------------------
[!!] CVE-2016-5584(<= 5.6.33) : "Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier
[!!] CVE-2016-8318(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server
[!!] CVE-2016-8327(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts)."
[!!] CVE-2017-10155(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10227(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10268(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier
[!!] CVE-2017-10276(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10279(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10283(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10286(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10294(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10314(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-10378(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier
[!!] CVE-2017-10379(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier
[!!] CVE-2017-10384(<= 5.6.37) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-15365(<= 5.6.36) : "sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking."
[!!] CVE-2017-3238(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3244(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3257(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts)."
[!!] CVE-2017-3258(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3265(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3273(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts)."
[!!] CVE-2017-3291(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3305(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client
[!!] CVE-2017-3308(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3309(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3312(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3313(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3317(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3318(<= 5.6.34) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier
[!!] CVE-2017-3329(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Thread Pooling). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3450(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily ""exploitable"" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3452(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.35 and earlier. Easily ""exploitable"" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3453(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3456(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3461(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3462(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3463(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3464(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3599(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily ""exploitable"" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet."
[!!] CVE-2017-3600(<= 5.6.35) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier
[!!] CVE-2017-3633(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Memcached to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update
[!!] CVE-2017-3634(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3636(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update
[!!] CVE-2017-3641(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2017-3647(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3648(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2017-3649(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2017-3651(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2017-3652(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2017-3653(<= 5.6.36) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier
[!!] CVE-2018-2562(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2573(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: GIS). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2583(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server
[!!] CVE-2018-2590(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2591(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2612(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation
[!!] CVE-2018-2622(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2640(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2645(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)."
[!!] CVE-2018-2647(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update
[!!] CVE-2018-2665(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2668(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior
[!!] CVE-2018-2696(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2703(<= 5.6.38) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2755(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2758(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2761(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2766(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2771(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2773(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2781(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2782(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2784(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2787(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update
[!!] CVE-2018-2805(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: GIS Extension). Supported versions that are affected are 5.6.39 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
[!!] CVE-2018-2813(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2817(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2818(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior
[!!] CVE-2018-2819(<= 5.6.39) : "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior
[!!] 80 CVE(s) found for your MySQL release.
-------- Performance Metrics -----------------------------------------------------------------------
[--] Up for: 43s (119 q [2.767 qps], 42 conn, TX: 47K, RX: 12K)
[--] Reads / Writes: 100% / 0%
[--] Binary logging is disabled
[--] Physical Memory : 59.0G
[--] Max MySQL memory : 352.4M
[--] Other process memory: 66.5M
[--] Total buffers: 192.0M global + 1.1M per thread (151 max threads)
[--] P_S Max memory usage: 0B
[--] Galera GCache Max memory usage: 0B
[OK] Maximum reached memory usage: 193.1M (0.32% of installed RAM)
[OK] Maximum possible memory usage: 352.4M (0.58% of installed RAM)
[OK] Overall possible memory usage with other process is compatible with memory available
[OK] Slow queries: 0% (0/119)
[OK] Highest usage of available connections: 0% (1/151)
[OK] Aborted connections: 0.00% (0/42)
[!!] name resolution is active : a reverse name resolution is made for each new connection and can reduce performance
[!!] Query cache may be disabled by default due to mutex contention.
[!!] Query cache efficiency: 0.0% (0 cached / 73 selects)
[OK] Query cache prunes per day: 0
[OK] No Sort requiring temporary tables
[OK] No joins without indexes
[OK] Temporary tables created on disk: 19% (60 on disk / 311 total)
[OK] Thread cache hit rate: 97% (1 created / 42 connections)
[OK] Table cache hit rate: 92% (81 open / 88 opened)
[OK] Open file limit used: 0% (46/1M)
[OK] Table locks acquired immediately: 100% (95 immediate / 95 locks)
-------- Performance schema ------------------------------------------------------------------------
[--] Performance schema is disabled.
[--] Memory used by P_S: 0B
[--] Sys schema isn't installed.
-------- ThreadPool Metrics ------------------------------------------------------------------------
[--] ThreadPool stat is disabled.
-------- MyISAM Metrics ----------------------------------------------------------------------------
[!!] Key buffer used: 18.2% (3M used / 16M cache)
[OK] Key buffer size / total MyISAM indexes: 16.0M/104.0K
-------- InnoDB Metrics ----------------------------------------------------------------------------
[--] InnoDB is enabled.
[--] InnoDB Thread Concurrency: 0
[OK] InnoDB File per table is activated
[OK] InnoDB buffer pool / data size: 128.0M/16.0K
[!!] Ratio InnoDB log file size / InnoDB Buffer pool size (75 %): 48.0M * 2/128.0M should be equal 25%
[!!] InnoDB buffer pool <= 1G and Innodb_buffer_pool_instances(!=1).
[--] InnoDB Buffer Pool Chunk Size not used or defined in your version
[!!] InnoDB Read buffer efficiency: 83.27% (901 hits/ 1082 total)
[!!] InnoDB Write Log efficiency: 0% (1 hits/ 0 total)
[OK] InnoDB log waits: 0.00% (0 waits / 1 writes)
-------- AriaDB Metrics ----------------------------------------------------------------------------
[--] AriaDB is disabled.
-------- TokuDB Metrics ----------------------------------------------------------------------------
[--] TokuDB is disabled.
-------- XtraDB Metrics ----------------------------------------------------------------------------
[--] XtraDB is disabled.
-------- RocksDB Metrics ---------------------------------------------------------------------------
[--] RocksDB is disabled.
-------- Spider Metrics ----------------------------------------------------------------------------
[--] Spider is disabled.
-------- Connect Metrics ---------------------------------------------------------------------------
[--] Connect is disabled.
-------- Galera Metrics ----------------------------------------------------------------------------
[--] Galera is disabled.
-------- Replication Metrics -----------------------------------------------------------------------
[--] Galera Synchronous replication: NO
[--] No replication slave(s) for this server.
[--] Binlog format: STATEMENT
[--] ON
[--] Semi synchronous replication Master: Not Activated
[--] Semi synchronous replication Slave: Not Activated
[--] This is a standalone server
-------- Recommendations ---------------------------------------------------------------------------
General recommendations:
ALTER TABLE travis.test MODIFY id ENUM('4') NOT NULL;
Set up a Password for user with the following SQL statement ( SET PASSWORD FOR 'user'@'SpecificDNSorIp' = PASSWORD('secure_password'); )
Restrict Host for user@% to user@SpecificDNSorIp
80 CVE(s) found for your MySQL release. Consider upgrading your version !
MySQL was started within the last 24 hours - recommendations may be inaccurate
Configure your accounts with ip or subnets only, then update your configuration with skip-name-resolve=1
Performance schema should be activated for better diagnostics
Consider installing Sys schema from https://github.com/mysql/mysql-sys
Before changing innodb_log_file_size and/or innodb_log_files_in_group read this: http://bit.ly/2wgkDvS
Variables to adjust:
query_cache_size (=0)
query_cache_type (=0)
query_cache_limit (> 1M, or use smaller result sets)
performance_schema = ON enable PFS
innodb_log_file_size should be (=16M) if possible, so InnoDB total log files size equals to 25% of buffer pool size.
innodb_buffer_pool_instances (=1)
travis_time:end:09832e48:start=1530803339273847476,finish=1530803343551746952,duration=4277899476
The command "./mysqltuner.pl --idxstat --dbstat" exited with 0.
Done. Your build exited with 1.