[USN-3629-2] MySQL vulnerabilities


–===============0595591358440352476==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-Y1ZOFkRnmPl2eIvyuh1m”

–=-Y1ZOFkRnmPl2eIvyuh1m
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3629-2
April 25, 2018

mysql-5.5 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in MySQL.

Software Description:
– mysql-5.5: MySQL database

Details:

USN-3629-1 fixed a vulnerability in MySQL. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0Multiple security issues were discovered in MySQL and this update
=C2=A0includes new upstream MySQL versions to fix these issues.

=C2=A0MySQL has been updated to 5.5.60 in Ubuntu 12.04 ESM.

=C2=A0In addition to security fixes, the updated packages contain bug fixes=
,
=C2=A0new features, and possibly incompatible changes.

=C2=A0Please see the following for more information:
=C2=A0http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-60.html
=C2=A0http://www.oracle.com/technetwork/security-advisory/cpuapr2018-367806=
7.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 mysql-server-5.5=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A05.5.60-0ubuntu0.12.04.1

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3629-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3629-1
=C2=A0 CVE-2018-2755, CVE-2018-2761, CVE-2018-2771, CVE-2018-2773,
=C2=A0 CVE-2018-2781, CVE-2018-2813, CVE-2018-2817, CVE-2018-2818,
=C2=A0 CVE-2018-2819
–=-Y1ZOFkRnmPl2eIvyuh1m
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=YodY
—–END PGP SIGNATURE—–

–=-Y1ZOFkRnmPl2eIvyuh1m–

–===============0595591358440352476==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============0595591358440352476==–