Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.52 and earlier, 5.6.33 and earlier and 5.7.15 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. External References: http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881724.html#AppendixMSQL
Created mariadb tracking bugs for this issue: Affects: fedora-all [bug 1386608]
Created community-mysql tracking bugs for this issue: Affects: fedora-all [bug 1386607]
Created mariadb-galera tracking bugs for this issue: Affects: fedora-all [bug 1386609]
It does not seem this CVE can be applicable to MySQL packages in Red Hat products. According to Oracle, this problem was fixed in versions 5.5.53, 5.6.34, and 5.7.16. Those versions include very few changes: http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-16.html http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-34.html http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html * Default for secure_file_priv was changed, and 5.5 and 5.6 branches also got backport of checks that prevent use of unsafe secure_file_priv settings. That change is related to the CVE-2016-6662 issue for "Server: Logging" sub-component, as listed in Oracle CPU. CVE-2016-6662 is tracked via bug 1375198. * Bundled yaSSL was upgrade to version 2.4.2. That upgrade is known to fix one security issue, listed in the CPU as CVE-2016-7440 for "Server: Security: Encryption" sub-component. Issue is tracked via bug 1386584. As Red Hat MySQL packages do not use bundled yaSSL, they were not affected by the CVE-2016-7440 issue. * OpenSSL bundled with MySQL Commercial Server builds was updated to newer upstream version, fixing multiple security issues. Related entry in the CPU is: CVE-2016-6304 for "Server: Security: Encryption" sub-component. This change was only relevant for 5.6 and 5.7. There were no other changes in those versions. Given the sub-component specified for this CVE, and the fact that OpenSSL update was not relevant to 5.5, it seems this CVE is for one of the other changes brought it by the yaSSL rebase: yaSSL was upgraded to version 2.4.2. This upgrade corrects issues with: ... DSA padding for unusual sizes; the SSL_CTX_load_verify_locations() OpenSSL compatibility function failing to handle long path directory names. (Bug #24512715, Bug #24740291) As noted above, issues in yaSSL do not affect Red Hat MySQL packages.