Comments on: Percona responds to CVE-2016-6663 and CVE-2016-6664 https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/ Tue, 06 Aug 2019 19:41:43 +0000 hourly 1 https://wordpress.org/?v=6.5.2 By: Nicholas https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967336 Fri, 11 Nov 2016 16:20:48 +0000 https://www.percona.com/blog/?p=39023#comment-10967336 In reply to Nicholas.

I meant between 5.5.41-25.12-855 and 5.5.41-37.0

]]>
By: Nicholas https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967335 Fri, 11 Nov 2016 16:07:22 +0000 https://www.percona.com/blog/?p=39023#comment-10967335 There seems to be no change in the percona-xtradb-cluster-5.5 between version 5.5.41-25.11.1 and 5.5.41-37.0. Are we sure this has the right fix? If so that seems to suggest the fix was in place back in Sept.

]]>
By: David Busby https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967329 Thu, 10 Nov 2016 15:01:34 +0000 https://www.percona.com/blog/?p=39023#comment-10967329 In reply to CasBuac7Kee.

I’ve had a response from our developers and that is that Percona Server 5.1 will move to “Customized support”, which essential is EOL unless someone pays for a release and backports. As such our recommendation is to upgrade to at least 5.5 as soon as possible.

]]>
By: CasBuac7Kee https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967311 Sun, 06 Nov 2016 16:01:08 +0000 https://www.percona.com/blog/?p=39023#comment-10967311 In reply to David Busby.

Thank you for your help! Unfortunately upgrade is not always an option, and not always my decision (due the tight software dependency).

Please note MySQL 5.1 is still supported and will supported until 2020 on RHEL6 (and their derivates CentOS6, Scientific Linux 6). But the Percona Server 5.1 is lot more tuned and has more administrative features for production workload, than the original version. So I would prefer to stay on the Percona Server 5.1 instead of replacing it with the untuned distro version. As Redhat will eventually release the fixes (as source code), your security team could also use it as a patch source. I would be really helpful if the security team at least integrate the security patches released by Redhat to the Percona Server 5.1 series, and rebuild the packages.

Thanks for your help!

]]>
By: David Busby https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967310 Sun, 06 Nov 2016 13:26:02 +0000 https://www.percona.com/blog/?p=39023#comment-10967310 In reply to CasBuac7Kee.

I will ask our development team, however given 5.1 went EOL in 2013 I would strongly recommend you look to upgrade as soon as possible!

]]>
By: David Busby https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967309 Sun, 06 Nov 2016 13:25:02 +0000 https://www.percona.com/blog/?p=39023#comment-10967309 In reply to etpropschroeder.

The versions noted in the post contain the fixes, of course I would recommend however that you use the latest version to ensure you have all of the most recent fixes.

]]>
By: CasBuac7Kee https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967308 Sun, 06 Nov 2016 01:41:32 +0000 https://www.percona.com/blog/?p=39023#comment-10967308 The CVE-2016-6663 could also successfully executed and gain a shell with mysql user on Percona-Server-server-51-5.1.73-rel14.12.624.rhel6.x86_64 ….

]]>
By: CasBuac7Kee https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967307 Sun, 06 Nov 2016 01:35:37 +0000 https://www.percona.com/blog/?p=39023#comment-10967307 Some of us still use the old 5.1 series of Percona Server. Any chance to backport these security fixes to the old 5.1 series?

]]>
By: etpropschroeder https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967306 Sat, 05 Nov 2016 17:38:23 +0000 https://www.percona.com/blog/?p=39023#comment-10967306 Just for clarity, the listed Percona Server/XtraDB Cluster versions are in fact patched, and not the most recent unpatched versions?

]]>
By: Sergei Golubchik https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967285 Thu, 03 Nov 2016 08:37:16 +0000 https://www.percona.com/blog/?p=39023#comment-10967285 In reply to David Busby.

Indeed, you are right. It is correct, strictly speaking. It just doesn’t mention the race condition, or REPAIR, or OPTIMIZE, or MyISAM, only CREATE/INSERT/SELECT, which aren’t used in this vulnerability at all. So it appears to look incorrectly and that was confusing. Sorry.

]]>
By: David Busby https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967284 Thu, 03 Nov 2016 08:25:14 +0000 https://www.percona.com/blog/?p=39023#comment-10967284 In reply to Sergei Golubchik.

This does look incorrect, I will advise marketing of the error.

]]>
By: David Busby https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967283 Thu, 03 Nov 2016 08:23:33 +0000 https://www.percona.com/blog/?p=39023#comment-10967283 In reply to Sergei Golubchik.

CVE-2016-6663 description was taken from the advisory linked

]]>
By: Sergei Golubchik https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967282 Thu, 03 Nov 2016 05:44:23 +0000 https://www.percona.com/blog/?p=39023#comment-10967282 In fact, -6663 looks wrong too

]]>
By: Sergei Golubchik https://www.percona.com/blog/percona-responds-to-cve-2016-6663-and-cve-2016-6664/#comment-10967281 Thu, 03 Nov 2016 05:42:51 +0000 https://www.percona.com/blog/?p=39023#comment-10967281 Your description for -6664 is totally wrong, you apparently, copy-pasted a description of a different vulnerability there

]]>