Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.
MySQL has been updated to 5.7.12 in Ubuntu 16.04 LTS.
In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.
Please see the following for more information: http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-12.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
{ "binaries": [ { "binary_version": "5.7.12-0ubuntu1", "binary_name": "libmysqlclient-dev" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "libmysqlclient20" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "libmysqld-dev" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-client" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-client-5.7" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-client-core-5.7" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-common" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-server" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-server-5.7" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-server-core-5.7" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-source-5.7" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-testsuite" }, { "binary_version": "5.7.12-0ubuntu1", "binary_name": "mysql-testsuite-5.7" } ], "availability": "No subscription required" }
{ "cves": [ { "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0639" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0642" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0643" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0647" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0648" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0655" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0657" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0659" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0662" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0666" }, { "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-0667" }, { "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2016-2047" } ], "ecosystem": "Ubuntu:16.04:LTS" }