12 Sep
2016
12 Sep
'16
11:38 p.m.
mysqld_safe != mysqld != something a client interacts with which distribution out there is running *mysqld* as root?
Did you read the advisory or I don't get what your are arguing against/for? A client interacts with a database which in some cases using simple SQL is able to overwrite configuration files which then might be used a by a safeguarding script (been there for ages). Further disclosure might explain how it can be done even without FILE or SUPER privileges.
but "MySQL-Exploit-Remote-Root-Code-Execution" is written by fools
If you call someone a fool for disclosing such an attack vector (which is aknowledged by all sides (the software developers / Mitre etc)) even if as you think doesn't affect you is quite rude. rr