[CLSA-2022:1658345239] Fix CVE(s): CVE-2022-21427, CVE-2022-21417, CVE-2022-21454, CVE-2022-21451, CVE-2022-21444, CVE-2022-21460
Type:
security
Severity:
Moderate
Release date:
2022-07-20 19:27:19 UTC
Description:
* SECURITY UPDATE: Update to 5.7.38 to fix security issues - CVE-2022-21417, CVE-2022-21427, CVE-2022-21444, CVE-2022-21451, CVE-2022-21454, CVE-2022-21460 - debian/rules,debian/tests/upstream: disable newly-failing main.slow_log test.
Updated packages:
  • libmysqlclient-dev_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:a270d8879954d52d224844ad7a28e0ca2a59057b
  • libmysqlclient20_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:fc58de9b5c8ced7b06757d74a5efcac94b9be186
  • libmysqld-dev_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:b2f8b853aade1783ea4a16c8243f8413c08e9c2c
  • mysql-client_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_all.deb
    sha:606627c89356bc1ddd1b471a7a7ee0475302d888
  • mysql-client-5.7_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:07b0dfe0adb98e69a820f0c0634dfcbc8ae1f488
  • mysql-client-core-5.7_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:053cbe50ec187ee583a7aa3e2ecd82804cb7ad63
  • mysql-common_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_all.deb
    sha:08f9aad329992a1d43d07ef54ee477e95d2cff8d
  • mysql-server_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_all.deb
    sha:39ab945385e74606b90befd3d814e8431a9d4c23
  • mysql-server-5.7_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:1a0fa33c3ec0bfc655b2ac95fa8ce64aac20480b
  • mysql-server-core-5.7_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:7b5b07af3cee3e69eaf6ac4374ba9178300630f7
  • mysql-source-5.7_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:e5b32a912801ef5e2e1525ca64d507d3e6e8afe1
  • mysql-testsuite_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_all.deb
    sha:d27bfd0646d737b3267113bd2564e8a0881477ba
  • mysql-testsuite-5.7_5.7.38-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:4eb41b171c5a9ccbb98bfabcee72da91c3d62a26
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.