Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting generallogfile to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
{
"versions": [
{
"introduced": "10.0.0"
},
{
"fixed": "10.0.27"
},
{
"introduced": "10.1.0"
},
{
"fixed": "10.1.17"
}
]
}{
"versions": [
{
"introduced": "5.5.0"
},
{
"last_affected": "5.5.52"
},
{
"introduced": "5.5.20"
},
{
"fixed": "5.5.51"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"introduced": "0"
},
{
"last_affected": "5.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.3"
},
{
"introduced": "0"
},
{
"last_affected": "7.3"
},
{
"introduced": "0"
},
{
"last_affected": "7.5"
},
{
"introduced": "0"
},
{
"last_affected": "7.3"
}
]
}[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"284474919473169016970406210133607862503",
"56620395527721358171084621192052395955",
"155751907007791503660291135721680547973",
"284464292980216230235061452928340542994"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2016-6662-16d79c87",
"target": {
"file": "sql/item_sum.cc"
},
"source": "https://github.com/mariadb/server/commit/a02642b66e06f95b80fa9ee592ba50eb61dc2f17"
},
{
"digest": {
"length": 1113.0,
"function_hash": "260358408969056573440033318428069010350"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2016-6662-4f786aaf",
"target": {
"function": "Item_sum::register_sum_func",
"file": "sql/item_sum.cc"
},
"source": "https://github.com/mariadb/server/commit/a02642b66e06f95b80fa9ee592ba50eb61dc2f17"
}
]
[
{
"events": [
{
"introduced": "5.7.0"
},
{
"last_affected": "5.7.15"
}
]
},
{
"events": [
{
"introduced": "5.6"
},
{
"fixed": "5.6.32-78.0"
}
]
},
{
"events": [
{
"introduced": "5.7"
},
{
"fixed": "5.7.14-7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6662.json"