|Description||Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||high (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|jessie (security), jessie||5.5.55-0+deb8u1||fixed|
The information below is based on the following data on fixed versions.
This will likely be split by MITRE, unclear what precisely maps to CVE-2016-6662
As well unclear which commits from https://bugzilla.redhat.com/show_bug.cgi?id=1375198#c5 are associated
yet to which CVE; those will unlikely made public before the next Oracle CPU.
Fixed in upstream Oracle MySQL 5.5.52, 5.6.33 and 5.7.15
Fixed in upstream MariaDB 5.5.51, 10.0.27, 10.1.17
Although Oracle mentions this CVE only to be fixed in 5.5.53 this is not
true for src:mysql-5.5 as in Debian and other Linux distributions, so
this CVE should not be listed for a DSA/DLA based on 5.5.53, cf #841050