Access Restriction Bypass Affecting mariadb-devel package, versions <1:5.5.52-1.el7


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

Exploit Maturity
Mature
EPSS
2.59% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE7-MARIADBDEVEL-2508934
  • published10 Apr 2022
  • disclosed20 Sept 2016

Introduced: 20 Sep 2016

CVE-2016-6662  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Oracle:7 mariadb-devel to version 1:5.5.52-1.el7 or higher.
This issue was patched in ELSA-2016-2595.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mariadb-devel package and not the mariadb-devel package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.

References