Malware Devil

Thursday, May 13, 2021

ESB-2021.1632 – [Ubuntu] MySQL: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1632
USN-4952-1: MySQL vulnerabilities
13 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: MySQL
Publisher: Ubuntu
Operating System: Ubuntu
Impact/Access: Modify Arbitrary Files — Existing Account
Denial of Service — Existing Account
Read-only Data Access — Existing Account
Access Confidential Data — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-2308 CVE-2021-2307 CVE-2021-2305
CVE-2021-2304 CVE-2021-2301 CVE-2021-2300
CVE-2021-2299 CVE-2021-2298 CVE-2021-2293
CVE-2021-2278 CVE-2021-2232 CVE-2021-2230
CVE-2021-2226 CVE-2021-2217 CVE-2021-2215
CVE-2021-2212 CVE-2021-2208 CVE-2021-2203
CVE-2021-2201 CVE-2021-2196 CVE-2021-2194
CVE-2021-2193 CVE-2021-2180 CVE-2021-2179
CVE-2021-2172 CVE-2021-2171 CVE-2021-2170
CVE-2021-2169 CVE-2021-2166 CVE-2021-2164
CVE-2021-2162 CVE-2021-2154 CVE-2021-2146

Reference: ASB-2021.0074
ESB-2021.1106
ESB-2021.0956
ESB-2021.0606

Original Bulletin:
https://ubuntu.com/security/notices/USN-4952-1

– ————————–BEGIN INCLUDED TEXT——————–

USN-4952-1: MySQL vulnerabilities
12 May 2021

Several security issues were fixed in MySQL.
Releases

o Ubuntu 21.04
o Ubuntu 20.10
o Ubuntu 20.04 LTS
o Ubuntu 18.04 LTS

Packages

o mysql-5.7 – MySQL database
o mysql-8.0 – MySQL database

Details

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.25 in Ubuntu 20.04 LTS, Ubuntu 20.10, and
Ubuntu 21.04. Ubuntu 18.04 LTS has been updated to MySQL 5.7.34.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-34.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-24.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-25.html
https://www.oracle.com/security-alerts/cpuapr2021.html

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 21.04

o mysql-server-8.0 – 8.0.25-0ubuntu0.21.04.1

Ubuntu 20.10

o mysql-server-8.0 – 8.0.25-0ubuntu0.20.10.1

Ubuntu 20.04

o mysql-server-8.0 – 8.0.25-0ubuntu0.20.04.1

Ubuntu 18.04

o mysql-server-5.7 – 5.7.34-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References

o CVE-2021-2154
o CVE-2021-2293
o CVE-2021-2203
o CVE-2021-2299
o CVE-2021-2180
o CVE-2021-2308
o CVE-2021-2170
o CVE-2021-2217
o CVE-2021-2304
o CVE-2021-2307
o CVE-2021-2179
o CVE-2021-2208
o CVE-2021-2166
o CVE-2021-2215
o CVE-2021-2193
o CVE-2021-2194
o CVE-2021-2146
o CVE-2021-2232
o CVE-2021-2278
o CVE-2021-2305
o CVE-2021-2171
o CVE-2021-2298
o CVE-2021-2162
o CVE-2021-2169
o CVE-2021-2301
o CVE-2021-2164
o CVE-2021-2196
o CVE-2021-2201
o CVE-2021-2172
o CVE-2021-2226
o CVE-2021-2212
o CVE-2021-2300
o CVE-2021-2230

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=xLe/
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1632 – [Ubuntu] MySQL: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/05/13/esb-2021-1632-ubuntu-mysql-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1632-ubuntu-mysql-multiple-vulnerabilities

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...