[USN-3725-2] MySQL vulnerabilities


–===============4355986563771045093==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-ty+RkM1c/tvlOTZ58Bnj”

–=-ty+RkM1c/tvlOTZ58Bnj
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3725-2
July 30, 2018

mysql-5.5 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in MySQL.

Software Description:
– mysql-5.5: MySQL database

Details:

USN-3725-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0Multiple security issues were discovered in MySQL and this update
=C2=A0includes new upstream MySQL versions to fix these issues.

=C2=A0MySQL has been updated to 5.5.61 in Ubuntu 12.04 ESM.

=C2=A0In addition to security fixes, the updated packages contain bug fixes=
,
=C2=A0new features, and possibly incompatible changes.

=C2=A0Please see the following for more information:
=C2=A0http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html
=C2=A0http://www.oracle.com/technetwork/security-advisory/cpujul2018-425824=
7.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 mysql-server-5.5=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A05.5.61-0ubuntu0.12.04.1

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3725-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3725-1
=C2=A0 CVE-2018-2767, CVE-2018-3058, CVE-2018-3063, CVE-2018-3066,
=C2=A0 CVE-2018-3070, CVE-2018-3081
–=-ty+RkM1c/tvlOTZ58Bnj
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=mPw3
—–END PGP SIGNATURE—–

–=-ty+RkM1c/tvlOTZ58Bnj–

–===============4355986563771045093==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============4355986563771045093==–