[USN-3799-1] MySQL vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”njK9JzKBbiXI3iWfmh4mgOM5kzfoP3t8o”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–njK9JzKBbiXI3iWfmh4mgOM5kzfoP3t8o

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3799-1] MySQL vulnerabilities

–5dJ9B91W58hh7yqhAtVSYtfEJu8p4HeBd

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3799-1
October 23, 2018

mysql-5.5, mysql-5.7 vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in MySQL.

Software Description:
– mysql-5.7: MySQL database
– mysql-5.5: MySQL database

Details:

Multiple security issues were discovered in MySQL and this update include=
s
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.5.62 in Ubuntu 14.04 LTS. Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, and Ubuntu 18.10 have been updated to MySQL 5.7.24.

In addition to security fixes, the updated packages contain bug fixes, ne=
w
features, and possibly incompatible changes.

Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-24.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.h=
tml

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
mysql-server-5.7 5.7.24-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
mysql-server-5.7 5.7.24-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
mysql-server-5.7 5.7.24-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
mysql-server-5.5 5.5.62-0ubuntu0.14.04.1

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3799-1
CVE-2018-3133, CVE-2018-3143, CVE-2018-3144, CVE-2018-3155,
CVE-2018-3156, CVE-2018-3161, CVE-2018-3162, CVE-2018-3171,
CVE-2018-3173, CVE-2018-3174, CVE-2018-3185, CVE-2018-3187,
CVE-2018-3200, CVE-2018-3247, CVE-2018-3251, CVE-2018-3276,
CVE-2018-3277, CVE-2018-3278, CVE-2018-3282, CVE-2018-3283,
CVE-2018-3284

Package Information:
https://launchpad.net/ubuntu/+source/mysql-5.7/5.7.24-0ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/mysql-5.7/5.7.24-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/mysql-5.7/5.7.24-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.62-0ubuntu0.14.04.1

–5dJ9B91W58hh7yqhAtVSYtfEJu8p4HeBd–

–njK9JzKBbiXI3iWfmh4mgOM5kzfoP3t8o

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=d5Rr
—–END PGP SIGNATURE—–

–njK9JzKBbiXI3iWfmh4mgOM5kzfoP3t8o–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK