This bug was fixed in the package mysql-8.0 - 8.0.21-0ubuntu0.20.04.3

---------------
mysql-8.0 (8.0.21-0ubuntu0.20.04.3) focal-security; urgency=medium

  * SECURITY UPDATE: Update to 8.0.21 to fix security issues
    - CVE-2020-14539, CVE-2020-14540, CVE-2020-14547, CVE-2020-14550,
      CVE-2020-14553, CVE-2020-14559, CVE-2020-14568, CVE-2020-14575,
      CVE-2020-14576, CVE-2020-14586, CVE-2020-14591, CVE-2020-14597,
      CVE-2020-14619, CVE-2020-14620, CVE-2020-14623, CVE-2020-14624,
      CVE-2020-14631, CVE-2020-14632, CVE-2020-14633, CVE-2020-14634,
      CVE-2020-14641, CVE-2020-14643, CVE-2020-14651, CVE-2020-14654,
      CVE-2020-14656, CVE-2020-14663, CVE-2020-14678, CVE-2020-14680,
      CVE-2020-14697, CVE-2020-14702
  * debian/rules: disable some tests that have expired certificates until
    new ones can be obtained from the upstream repo.
  * debian/tests/upstream: disable some tests that have expired
    certificates until new ones can be obtained from the upstream repo.
  * debian/tests/upstream: disable new test that can't locate
    mysqltest_safe_process binary.
  * debian/mysql-router.install, debian/mysql-server-core-8.0.install,
    debian/mysql-testsuite-8.0.install: use wildcard for libprotobuf-lite
    library version.
  * debian/mysql-router.install: added router_protobuf.so.
  * debian/mysql-testsuite-8.0.install: added
    component_test_component_deinit.so.
  * debian/patches/charset_file_crash.patch: don't crash on malformed
    charset files in mysys/charset.cc (LP: #1884809)
  * Fix FTBFS on RISC-V.
    - d/p/use-largest-lock-free-type-selector-on-riscv.patch: Force
      the use of Largest_lock_free_type_selector instead of
      Lock_free_type_selector when compiling for RISC-V, since the
      latter will cause a compilation failure due to RISC-V's
      inability to provide the always-lock-free property for some
      specific types.

 -- Marc Deslauriers <marc.deslauri...@ubuntu.com>  Mon, 27 Jul 2020
11:58:55 -0400

** Changed in: mysql-8.0 (Ubuntu)
       Status: New => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14539

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14540

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14547

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14550

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14553

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14559

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14568

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14575

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14576

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14586

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14591

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14597

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14619

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14620

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14623

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14624

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14631

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14632

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14633

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14634

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14641

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14643

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14651

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14654

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14656

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14663

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14678

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14680

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14697

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14702

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1884809

Title:
  libmysqlclient21 crashes if certain collation definitions are found in
  MySQL's sharedir

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1884809/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to