All Vulnerability Reports

USN-6288-2: MySQL vulnerability


Severity

Medium

Vendor

VMware Tanzu

Versions Affected

  • Canonical Ubuntu 16.04
  • Canonical Ubuntu 18.04

Description

USN-6288-1 fixed a vulnerability in MySQL. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.7.43 in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-43.html https://www.oracle.com/security-alerts/cpujul2023.html Update Instructions: Run `sudo pro fix USN-6288-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: mysql-client - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-source-5.7 - 5.7.43-0ubuntu0.16.04.1+esm1 libmysqlclient-dev - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-client-core-5.7 - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-client-5.7 - 5.7.43-0ubuntu0.16.04.1+esm1 libmysqlclient20 - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-server-5.7 - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-common - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-server - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-server-core-5.7 - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-testsuite - 5.7.43-0ubuntu0.16.04.1+esm1 libmysqld-dev - 5.7.43-0ubuntu0.16.04.1+esm1 mysql-testsuite-5.7 - 5.7.43-0ubuntu0.16.04.1+esm1 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro

CVEs contained in this USN include: CVE-2023-22053

Affected VMware Products and Versions

Severity is medium unless otherwise noted.

  • Isolation Segment
    • Only unsupported release lines of this product are affected
  • Operations Manager
    • 2.10.x versions prior to 2.10.65
  • VMware Tanzu Application Service for VMs
    • 2.3.x versions prior to 2.3.3

Mitigation

Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:

  • Isolation Segment
    • 2.3.0
    • 2.4.0
    • 2.5.0
    • 2.6.0
    • 2.7.0
    • 2.8.0
    • 2.9.0
    • 2.10.0
    • 2.11.0
    • 2.12.0
    • 2.13.0
    • 3.0.0
    • 4.0.0+LTS-T
  • Operations Manager
    • 2.10.65
  • VMware Tanzu Application Service for VMs
    • 2.3.3
    • 2.4.0
    • 2.5.0
    • 2.6.0
    • 2.7.0
    • 2.8.0
    • 2.9.0
    • 2.10.0
    • 2.11.0
    • 2.12.0
    • 2.13.0
    • 3.0.0
    • 4.0.0+LTS-T

References

History

2023-12-04: Initial vulnerability report published.