This is probably of interest to many of you, and I've not seen it on the list 
yet.

Kenny Gryp's blog about the vulnerability is at 
https://www.percona.com/blog/2016/09/12/database-affected-cve-2016-6662/ . 

For those who use it, there's an ansible playbook to patch the workaround into 
mysqld_safe at https://github.com/meersjo/ansible-mysql-cve-2016-6662 .

/Johan

----- Forwarded Message -----
From: "Percona" <em...@percona.com>
To: perc...@tuxera.be
Sent: Wednesday, 14 September, 2016 00:42:18
Subject: Update to Percona CVE-2016-6662 Vulnerability Communication


Earlier yesterday, via blog post and email, we alerted people to CVE-2016-6662 
. 

This vulnerability meant that certain Percona Server (and MySQL) scenarios 
could allow a remote root code execution. 

As of late 9/12, we added a new blog post that explains the vulnerability, if 
it affects you, how to prevent the vulnerability from affecting older versions 
of MySQL and which versions of Percona Server have been updated with a fix: 

Is Your Database Affected by CVE-2016-6662? 


Click through to that blog for more information on how to protect your 
environment from CVE-2016-6662. 

We will release an update to Percona XtraDB Cluster versions 5.5 and 5.6 with a 
fix for CVE-2016-6662 next week. In the meantime, the steps outlined in the 
“Configuration files permissions” section in the post above should protect your 
servers from the vulnerability. 

Contact us if you need more information or assistance . 

If you are a customer, please contact support via normal support channels . 

Thank You, 
Support 

        

        

        
        
                                                                                
        
        


Percona 8081 Arco Corporate Drive Suite 170 Raleigh, NC 27617 United States 

You received this email because you are subscribed to Tell Me Everything! from 
Percona. 

Update your email preferences to choose the types of emails you receive. 

Unsubscribe from all future emails 

        


-- 
Unhappiness is discouraged and will be corrected with kitten pictures.

--
MySQL General Mailing List
For list archives: http://lists.mysql.com/mysql
To unsubscribe:    http://lists.mysql.com/mysql

Reply via email to