Percona announces the release of Percona Server for MySQL 5.6.44-85.0 on May 17, 2019. Download the latest version from the Percona web site or the Percona Software Repositories. You can also run Docker containers from the images in the Docker Hub repository.
Based on MySQL 5.6.44, and including all the bug fixes in it, Percona Server for MySQL 5.6.44-85.0 is the current GA release in the Percona Server for MySQL 5.6 series. Percona Server for MySQL is open-source and free – this is the latest release of our enhanced, drop-in replacement for MySQL.
Audit_log_buffer_size_overflowstatus variable has been implemented to track when an Audit Log Plugin entry was either dropped or written directly to the file due to its size being bigger than
- TokuDB storage engine would assert on load when used with jemalloc 5.x. Bug fixed #5406.
FLUSHcommands written to the binary log could cause errors in case of replication. Bug fixed #1827 (upstream #88720).
- TokuDB storage engine couldn’t be enabled on Docker images. Bug fixed #5283.
ACCESS_DENIEDfield of the
information_schema.user_statisticstable was not updated correctly. Bugs fixed #3956, #4996.
postinstmaintainer script in
percona-server-server-5.6package did not escape the password properly and as a result would fail to use it. Bug fixed #4572.
- the page cleaner could sleep for long time when the system clock was adjusted to an earlier point in time. Bug fixed #5221 (upstream #93708).
SHOW BINLOG EVENTfrom an invalid position could result in a segmentation fault on 32bit machines. Bug fixed #5243.
BLOBentries in the binary log could become corrupted in case when a database with Blackhole tables served as an intermediate binary log server in a replication chain. Bug fixed #5353 (upstream #93917).
- when Audit Log Plugin was enabled, the server could use a lot of memory when handling large queries. Bug fixed #5395.
locktreelibrary was re-licensed to Apache v2 license. Bug fixed #5501.
This release also contains the fixes for the following security issues: CVE-2018-3123, CVE-2019-2683, CVE-2019-2627, and CVE-2019-2614.
NOTE [2019-05-18]: Debian/Ubuntu
5.6.44-85.0-1 packages were replaced today in the repositories with the
5.6.44-85.0-2 because they would reset the root password to an empty string during the upgrade on Debian/Ubuntu (bug #5640). If you upgraded packages on Debian/Ubuntu to the
5.6.44-85.0-1 please upgrade to
5.6.44-85.0-2 and re-set your root password.