USN-4651-1: MySQL vulnerabilities

Publication date

30 November 2020

Overview

MySQL could allow unintended access to network services.

Releases


Packages

Details

Tom Reynolds discovered that due to a packaging error, the MySQL X Plugin
was listening to all network interfaces by default, contrary to
expectations.

This update changes the default MySQL configuration to bind the MySQL X
Plugin to localhost only. This change may impact environments where the
MySQL X Plugin needs to be accessible from the network. The
mysqlx-bind-address setting in the /etc/mysql/mysql.conf.d/mysqld.cnf file
can be modified to allow network access.

Tom Reynolds discovered that due to a packaging error, the MySQL X Plugin
was listening to all network interfaces by default, contrary to
expectations.

This update changes the default MySQL configuration to bind the MySQL X
Plugin to localhost only. This change may impact environments where the
MySQL X Plugin needs to be accessible from the network. The
mysqlx-bind-address setting in the /etc/mysql/mysql.conf.d/mysqld.cnf file
can be modified to allow network access.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.04 LTS focal mysql-server-8.0 –  8.0.22-0ubuntu0.20.04.3

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›