How to estimate a company’s health without really trying

Conceptual image of a female doctor with a stethoscope Within the past few months, NetSuite, Marketo, LinkedIn, FleetMatics and LogMeIn have each been acquired or merged for a combined value of more than $50 billion. At this rate, public SaaS companies may become an endangered species. Clearly, PE investors and larger technology companies sense opportunity and value. Read More


GHOST vulnerability (CVE-2015-0235) Percona response

Cloud security company Qualys announced Tuesday the issues prevalent in glibc since version 2.2 introduced in 2000-11-10 (the complete Qualys announcement may be viewed here). The vulnerability, CVE-2015-0235, has been dubbed “GHOST.”

As the announcement from Qualys indicates, it is believed that MySQL and by extension Percona Server are not affected by this issue.

Percona is in the process of conducting our own review into the issue related to the Percona Server source code – more information will be released as soon as it is available.

In the interim the current advisory is to update your glibc packages for your distributions if they are in fact vulnerable. The C code from the Qualys announcement may aid in your diagnostics, section 4 of this document or via this gist. I also wrote a very quick python script to help identify processes which may be running libc that you can access here.

Compiling the above and executing it will yield an output indicating if your glibc version is believed to be vulnerable or not vulnerable.

Distribution Resource Resource Links

    1. RedHat BZ:
    2. RedHat EL5 Errata:
    3. RedHat EL6 / 7 Errata:
    4. Ubuntu USN: (affects 10.04 12.04)
    5. Debian security tracker:

Distributions which use musl-libc ( are not affected by this issue.



Robert Barabas – Percona
Raghavendra Prabhu – Percona
Laurynas Biveinis – Percona

The post GHOST vulnerability (CVE-2015-0235) Percona response appeared first on MySQL Performance Blog.

Powered by WordPress | Theme: Aeros 2.0 by