This bug was fixed in the package mysql-8.0 - 8.0.21-0ubuntu0.20.04.3
---------------
mysql-8.0 (8.0.21-0ubuntu0.20.04.3) focal-security; urgency=medium
* SECURITY UPDATE: Update to 8.0.21 to fix security issues
- CVE-2020-14539, CVE-2020-14540, CVE-2020-14547, CVE-2020-14550,
CVE-2020-14553, CVE-2020-14559, CVE-2020-14568, CVE-2020-14575,
CVE-2020-14576, CVE-2020-14586, CVE-2020-14591, CVE-2020-14597,
CVE-2020-14619, CVE-2020-14620, CVE-2020-14623, CVE-2020-14624,
CVE-2020-14631, CVE-2020-14632, CVE-2020-14633, CVE-2020-14634,
CVE-2020-14641, CVE-2020-14643, CVE-2020-14651, CVE-2020-14654,
CVE-2020-14656, CVE-2020-14663, CVE-2020-14678, CVE-2020-14680,
CVE-2020-14697, CVE-2020-14702
* debian/rules: disable some tests that have expired certificates until
new ones can be obtained from the upstream repo.
* debian/tests/upstream: disable some tests that have expired
certificates until new ones can be obtained from the upstream repo.
* debian/tests/upstream: disable new test that can't locate
mysqltest_safe_process binary.
* debian/mysql-router.install, debian/mysql-server-core-8.0.install,
debian/mysql-testsuite-8.0.install: use wildcard for libprotobuf-lite
library version.
* debian/mysql-router.install: added router_protobuf.so.
* debian/mysql-testsuite-8.0.install: added
component_test_component_deinit.so.
* debian/patches/charset_file_crash.patch: don't crash on malformed
charset files in mysys/charset.cc (LP: #1884809)
* Fix FTBFS on RISC-V.
- d/p/use-largest-lock-free-type-selector-on-riscv.patch: Force
the use of Largest_lock_free_type_selector instead of
Lock_free_type_selector when compiling for RISC-V, since the
latter will cause a compilation failure due to RISC-V's
inability to provide the always-lock-free property for some
specific types.
-- Marc Deslauriers <[email protected]> Mon, 27 Jul 2020
11:58:55 -0400
** Changed in: mysql-8.0 (Ubuntu)
Status: New => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14539
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14540
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14547
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14550
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14553
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14559
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14568
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14575
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14576
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14586
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14591
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14597
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14619
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14620
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14623
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14624
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14631
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14632
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14633
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14634
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14641
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14643
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14651
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14654
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14656
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14663
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14678
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14680
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14697
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14702
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1884809
Title:
libmysqlclient21 crashes if certain collation definitions are found in
MySQL's sharedir
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1884809/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs