{"id":"USN-3040-1","summary":"mysql-5.5, mysql-5.6, mysql-5.7 vulnerabilities","details":"Multiple security issues were discovered in MySQL and this update includes\nnew upstream MySQL versions to fix these issues.\n\nMySQL has been updated to 5.5.50 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.\nUbuntu 15.10 has been updated to MySQL 5.6.31. Ubuntu 16.04 LTS has been\nupdated to MySQL 5.7.13.\n\nIn addition to security fixes, the updated packages contain bug fixes,\nnew features, and possibly incompatible changes.\n\nPlease see the following for more information:\nhttp://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html\nhttp://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-31.html\nhttp://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-13.html\nhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\n","modified":"2026-02-10T04:41:01Z","published":"2016-07-21T16:46:08Z","related":["UBUNTU-CVE-2016-3424","UBUNTU-CVE-2016-3459","UBUNTU-CVE-2016-3477","UBUNTU-CVE-2016-3486","UBUNTU-CVE-2016-3501","UBUNTU-CVE-2016-3518","UBUNTU-CVE-2016-3521","UBUNTU-CVE-2016-3588","UBUNTU-CVE-2016-3614","UBUNTU-CVE-2016-3615","UBUNTU-CVE-2016-5436","UBUNTU-CVE-2016-5437","UBUNTU-CVE-2016-5439","UBUNTU-CVE-2016-5440","UBUNTU-CVE-2016-5441","UBUNTU-CVE-2016-5442","UBUNTU-CVE-2016-5443"],"upstream":["CVE-2016-3424","CVE-2016-3459","CVE-2016-3477","CVE-2016-3486","CVE-2016-3501","CVE-2016-3518","CVE-2016-3521","CVE-2016-3588","CVE-2016-3614","CVE-2016-3615","CVE-2016-5436","CVE-2016-5437","CVE-2016-5439","CVE-2016-5440","CVE-2016-5441","CVE-2016-5442","CVE-2016-5443","UBUNTU-CVE-2016-3424","UBUNTU-CVE-2016-3459","UBUNTU-CVE-2016-3477","UBUNTU-CVE-2016-3486","UBUNTU-CVE-2016-3501","UBUNTU-CVE-2016-3518","UBUNTU-CVE-2016-3521","UBUNTU-CVE-2016-3588","UBUNTU-CVE-2016-3614","UBUNTU-CVE-2016-3615","UBUNTU-CVE-2016-5436","UBUNTU-CVE-2016-5437","UBUNTU-CVE-2016-5439","UBUNTU-CVE-2016-5440","UBUNTU-CVE-2016-5441","UBUNTU-CVE-2016-5442","UBUNTU-CVE-2016-5443"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3040-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3424"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3459"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3477"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3486"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3501"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3518"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3521"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3588"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3614"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3615"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5436"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5437"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5439"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5440"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5441"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5442"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5443"}],"affected":[{"package":{"name":"mysql-5.5","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/mysql-5.5@5.5.50-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.50-0ubuntu0.14.04.1"}]}],"versions":["5.5.32-0ubuntu7","5.5.34-0ubuntu1","5.5.34-0ubuntu2","5.5.35-0ubuntu1","5.5.35+dfsg-1ubuntu1","5.5.37-0ubuntu0.14.04.1","5.5.38-0ubuntu0.14.04.1","5.5.40-0ubuntu0.14.04.1","5.5.41-0ubuntu0.14.04.1","5.5.43-0ubuntu0.14.04.1","5.5.44-0ubuntu0.14.04.1","5.5.46-0ubuntu0.14.04.2","5.5.47-0ubuntu0.14.04.1","5.5.49-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"libmysqlclient-dev"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"libmysqlclient18"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"libmysqld-dev"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"libmysqld-pic"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-client"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-client-5.5"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-client-core-5.5"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-common"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-server"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-server-5.5"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-server-core-5.5"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-source-5.5"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-testsuite"},{"binary_version":"5.5.50-0ubuntu0.14.04.1","binary_name":"mysql-testsuite-5.5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3040-1.json","cves_map":{"cves":[{"id":"CVE-2016-3477","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3521","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3615","severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5440","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"mysql-5.7","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/mysql-5.7@5.7.13-0ubuntu0.16.04.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.7.13-0ubuntu0.16.04.2"}]}],"versions":["5.7.11-0ubuntu4","5.7.11-0ubuntu5","5.7.11-0ubuntu6","5.7.12-0ubuntu1","5.7.12-0ubuntu1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"libmysqlclient-dev"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"libmysqlclient20"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"libmysqld-dev"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-client"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-client-5.7"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-client-core-5.7"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-common"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-server"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-server-5.7"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-server-core-5.7"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-source-5.7"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-testsuite"},{"binary_version":"5.7.13-0ubuntu0.16.04.2","binary_name":"mysql-testsuite-5.7"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3040-1.json","cves_map":{"cves":[{"id":"CVE-2016-3424","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3459","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3477","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3486","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3501","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3518","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3521","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3588","severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3614","severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-3615","severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5436","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5437","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5439","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5440","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5441","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5442","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5443","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}