[USN-3799-2] MySQL vulnerabilities

protocol=”application/pgp-signature”; boundary=”=-wuCqraYaAbtQbwTSUmzA”

–=-wuCqraYaAbtQbwTSUmzA

Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3799-2
October 29, 2018

mysql-5.5 vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in MySQL.

Software Description:
– mysql-5.5: MySQL database

Details:

USN-3799-1 fixed a vulnerability in MySQL. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0Multiple security issues were discovered in MySQL and this update
=C2=A0includes new upstream MySQL versions to fix these issues.

=C2=A0MySQL has been updated to 5.5.62 in Ubuntu 12.04 ESM.

=C2=A0In addition to security fixes, the updated packages contain bug fixes=
,
=C2=A0new features, and possibly incompatible changes.

=C2=A0Please see the following for more information:
=C2=A0http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html
=C2=A0https://www.oracle.com/technetwork/security-advisory/cpuoct2018-44282=
96.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 mysql-server-5.5=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A05.5.62-0ubuntu0.12.04.1

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3799-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3799-1
=C2=A0 CVE-2018-3133, CVE-2018-3174, CVE-2018-3282
–=-wuCqraYaAbtQbwTSUmzA

Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQIcBAABCAAGBQJb1vgRAAoJEEW851uECx9pk0UP/2G9jSrfmlHA3CVd7id6YTxO
NE0KizP2gOUw2ZiSmwJCdD+51bbsK9OnYCpaU7j2l6dfXbrr+3SAwAfdwHv9amEX
gTsPQBORhDV23HEGEIu2VP7cf9uJYaNWn2Xipo6pvSG5A3nHbbaJwc1RY8XDACkC
PcicJ06xI/WWtWh2J3PNPrLXxPUkF/O9y+gqBhzHA6CVSWRLvWDSo2kHGd6/P/Xx
NspNMfpklZ+LP6zApaLTXETIMgDeAfm9CYroOwwkrMwVhZHbBIcY34VkLGsEal2C
pKZTeJttqlbai7ozk/oJmzhmfyLEsncgpFkyxEyybVgwL495lDaaQh3Wetq4kQMV
IIoz74xBJlJK090HsrY0OCmxZAkd9bYXpU8ValAxoCDqPcDNk70u14+7QLHenDPx
R7hJQkGTm5EUIejTocPkX42Sgd0bWuPpMj99hZGIjv2WoTo810/Kxg+0JHOsJcVz
cJtvG20wrU35m6rn5PkyIqUD3MArpm5qjFjAlXRFFIJzdPSAv0wHnokBh4Wi4qGZ
+b1MTio1jZKWVgWQKF28kKJstJHMGVfQd4wZ+j+eqsDXXIj7B11cW24CYrfOuN88
5KyoZRt+JqapyKoaEv6VyG4jM3XE5v8BFPw/hToUAbhJgpcENUf5DP1LkHdncaaE
4hj6CQqCQml5C9O2nxkM
=Vki/
—–END PGP SIGNATURE—–

–=-wuCqraYaAbtQbwTSUmzA–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK