Access Restriction Bypass Affecting mysql-5.7 package, versions <5.7.15-0ubuntu0.16.04.1


Severity

Recommended
medium

Based on Ubuntu security rating

    Threat Intelligence

    Exploit Maturity
    Mature
    EPSS
    0.93% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UBUNTU1604-MYSQL57-359776
  • published 20 Sep 2016
  • disclosed 20 Sep 2016

How to fix?

Upgrade Ubuntu:16.04 mysql-5.7 to version 5.7.15-0ubuntu0.16.04.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mysql-5.7 package and not the mysql-5.7 package as distributed by Ubuntu. See How to fix? for Ubuntu:16.04 relevant fixed versions and status.

Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.

References