-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1583
                     USN-4350-1: MySQL vulnerabilities
                                5 May 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           MySQL
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Modify Arbitrary Files   -- Existing Account      
                   Delete Arbitrary Files   -- Existing Account      
                   Denial of Service        -- Existing Account      
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-2930 CVE-2020-2928 CVE-2020-2926
                   CVE-2020-2925 CVE-2020-2924 CVE-2020-2923
                   CVE-2020-2922 CVE-2020-2921 CVE-2020-2904
                   CVE-2020-2903 CVE-2020-2901 CVE-2020-2898
                   CVE-2020-2897 CVE-2020-2896 CVE-2020-2895
                   CVE-2020-2893 CVE-2020-2892 CVE-2020-2812
                   CVE-2020-2804 CVE-2020-2780 CVE-2020-2765
                   CVE-2020-2763 CVE-2020-2762 CVE-2020-2760
                   CVE-2020-2759  

Reference:         ASB-2020.0087

Original Bulletin: 
   https://usn.ubuntu.com/4350-1/

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4350-1: MySQL vulnerabilities
4 May 2020

mysql-5.7, mysql-8.0 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:

  o Ubuntu 20.04 LTS
  o Ubuntu 19.10
  o Ubuntu 18.04 LTS
  o Ubuntu 16.04 LTS

Summary

Several security issues were fixed in MySQL.

Software Description

  o mysql-8.0 - MySQL database
  o mysql-5.7 - MySQL database

Details

Multiple security issues were discovered in MySQL and this update includes new
upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.80 in Ubuntu 19.10 and Ubuntu 20.04 LTS. Ubuntu
16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.30.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-30.html

https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-20.html

https://www.oracle.com/security-alerts/cpuapr2020.html

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 20.04 LTS
    mysql-server-8.0 - 8.0.20-0ubuntu0.20.04.1
Ubuntu 19.10
    mysql-server-8.0 - 8.0.20-0ubuntu0.19.10.1
Ubuntu 18.04 LTS
    mysql-server-5.7 - 5.7.30-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
    mysql-server-5.7 - 5.7.30-0ubuntu0.16.04.1

To update your system, please follow these instructions: https://
wiki.ubuntu.com/Security/Upgrades .

This update uses a new upstream release, which includes additional bug fixes.
In general, a standard system update will make all the necessary changes.

References

  o CVE-2020-2759
  o CVE-2020-2760
  o CVE-2020-2762
  o CVE-2020-2763
  o CVE-2020-2765
  o CVE-2020-2780
  o CVE-2020-2804
  o CVE-2020-2812
  o CVE-2020-2892
  o CVE-2020-2893
  o CVE-2020-2895
  o CVE-2020-2896
  o CVE-2020-2897
  o CVE-2020-2898
  o CVE-2020-2901
  o CVE-2020-2903
  o CVE-2020-2904
  o CVE-2020-2921
  o CVE-2020-2922
  o CVE-2020-2923
  o CVE-2020-2924
  o CVE-2020-2925
  o CVE-2020-2926
  o CVE-2020-2928
  o CVE-2020-2930

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXrDpSWaOgq3Tt24GAQho1hAAm91LxOEmGnmJNLwDHmSGefN3so4Ss1UO
mXK4R4F2s3QtFBpEY4y8TyV/mr9rWlUWqKLQ3xOf0iYCPq1ozF6R60o6MJPx/UxQ
UcFPLZWj4BAf5EYfvj8AM6nU4eoELDyeRW12lz4lu1DhmxMASkwZyT7iqMsy18au
IqMXQrvFQczr6Y5LXt3tl09lzOyqlUk4lxFDEXvhZaucE2shJDXaBrcEOGnj98QH
YX1DxE0Hu869kM8IcbaT2LURprUt4efPZoaVFhe56xuPAAIY/phg65gfuC7w0XLa
Ebcdy7Rs5KG0R+234VUFYNNzYYzeYdubmI18dzQMHHDonDynmFMnUVEr5IDtROhK
LfRAPOG37jPRJ70Nn9pElG5MsZ1UAbL7tXRxIvqZtcOweNAE5epfCocGDqAroyhz
a2kE2SNogrATAo0nT/44iYJr2fcm3jdoWAMjGel4RU2emJ6fx8LJIK16TwI5yvxw
EGRg0srT361PPebcMCmjIcX2te9QC3qPGEtekRSqhjWrWC5mmA5uEgq7S5+TcSrQ
O/O9PgQCd9VRfHQl8kPJlDX6DOqypHhEqRHSdUODjP2xvjOcDT5LlCQWgFac/Tl+
uPsBsnYZMmnctDnfpjXIWbuKFXWnZw3MGrilcmQp+30xKHZTV4gejWgQvj0xBFof
ptp7AXN77tY=
=Fbnp
-----END PGP SIGNATURE-----