Your message dated Sun, 25 Oct 2015 13:48:40 +0000
with message-id <e1zqlf6-0003hd...@franck.debian.org>
and subject line Bug#802564: fixed in mysql-5.5 5.5.46-0+deb7u1
has caused the Debian Bug report #802564,
regarding mysql-5.5: Multiple security fixes from the October 2015 CPU
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
802564: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802564
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: mysql-5.5
Version: 5.5.23-2
Severity: grave
Tags: security upstream fixed-upstream
Hi,
As usual for this time of the year: there is a new Oracle Patch update
including updates for MySQL, see:
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixMSQL
Regards,
Salvatore
-- System Information:
Debian Release: stretch/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
--- End Message ---
--- Begin Message ---
Source: mysql-5.5
Source-Version: 5.5.46-0+deb7u1
We believe that the bug you reported is fixed in the latest version of
mysql-5.5, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 802...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated mysql-5.5 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 23 Oct 2015 18:30:49 +0200
Source: mysql-5.5
Binary: libmysqlclient18 libmysqld-pic libmysqld-dev libmysqlclient-dev
mysql-common mysql-client-5.5 mysql-server-core-5.5 mysql-server-5.5
mysql-server mysql-client mysql-testsuite-5.5 mysql-source-5.5
Architecture: all source
Version: 5.5.46-0+deb7u1
Distribution: wheezy-security
Urgency: high
Maintainer: Debian MySQL Maintainers <pkg-mysql-ma...@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 802564
Description:
libmysqlclient-dev - MySQL database development files
libmysqlclient18 - MySQL database client library
libmysqld-dev - MySQL embedded database development files
libmysqld-pic - PIC version of MySQL embedded server development files
mysql-client - MySQL database client (metapackage depending on the latest
versio
mysql-client-5.5 - MySQL database client binaries
mysql-common - MySQL database common files, e.g. /etc/mysql/my.cnf
mysql-server - MySQL database server (metapackage depending on the latest
versio
mysql-server-5.5 - MySQL database server binaries and system database setup
mysql-server-core-5.5 - MySQL database server binaries
mysql-source-5.5 - MySQL source
mysql-testsuite-5.5 - MySQL testsuite
Changes:
mysql-5.5 (5.5.46-0+deb7u1) wheezy-security; urgency=high
.
* Non-maintainer upload by the Security Team.
* Imported Upstream version 5.5.46 to fix security issues:
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- CVE-2015-4792 CVE-2015-4802 CVE-2015-4815 CVE-2015-4816 CVE-2015-4819
CVE-2015-4826 CVE-2015-4830 CVE-2015-4836 CVE-2015-4858 CVE-2015-4861
CVE-2015-4870 CVE-2015-4879 CVE-2015-4913
(Closes: #802564)
* Add fix-test-suite-failure-caused-by-arbitrary-date-in-the-future.patch.
Fix test suite failure caused by arbitrary date in the future.
Thanks to Marc Deslauriers <marc.deslauri...@canonical.com>
* Add revert-to-_sync_lock_test_and_set.patch.
Fixes FTBFS on arm and powerpw by reverting to __sync_lock_test_and_set.
The gcc version in wheezy is too old to have __atomic_*.
Thanks to Marc Deslauriers <marc.deslauri...@canonical.com> for the patch.
Checksums-Sha1:
34910a993908575751f9cccd1e0ef943009c29a2 3038 mysql-5.5_5.5.46-0+deb7u1.dsc
246fd16a5d1e656c891df44d25071bd0a6997e35 379250
mysql-5.5_5.5.46-0+deb7u1.debian.tar.gz
404f9e51a92773f880a6817bfc0497222464425a 84764
mysql-common_5.5.46-0+deb7u1_all.deb
be4eac4addae50cc0e07627c849fcd60739bd786 83010
mysql-server_5.5.46-0+deb7u1_all.deb
bc92e2a62ed0591b2bc342408264c779f6b332c9 82888
mysql-client_5.5.46-0+deb7u1_all.deb
Checksums-Sha256:
36d26087f912c4b429f444db687f9f77532540e9db015de11b92325788c737d3 3038
mysql-5.5_5.5.46-0+deb7u1.dsc
6b57e55aba1abcbfe62e7f905e4a22c9fa62fa15e8205b5c0e82866881f57844 379250
mysql-5.5_5.5.46-0+deb7u1.debian.tar.gz
3adb7876dfdd230ac66903dd2ea48ef69a61798f1e98df42a090608eda44285c 84764
mysql-common_5.5.46-0+deb7u1_all.deb
8df2e4974d4db4027d52dd104ee9908309608b8b879d717d86b1694e0a18a34a 83010
mysql-server_5.5.46-0+deb7u1_all.deb
3d0d69a2a752e939c6f8dfe30c15d06ecc4bdba77796829e0e9ea51718d4afea 82888
mysql-client_5.5.46-0+deb7u1_all.deb
Files:
55caf78144455314184d895b6490ef98 3038 database optional
mysql-5.5_5.5.46-0+deb7u1.dsc
ebe4984adea678cb87ce97f4c63a0d7c 379250 database optional
mysql-5.5_5.5.46-0+deb7u1.debian.tar.gz
41f9218aa6018aca25281c9a39cd828e 84764 database optional
mysql-common_5.5.46-0+deb7u1_all.deb
81ef5b29100064f710181a6e5edaa7f0 83010 database optional
mysql-server_5.5.46-0+deb7u1_all.deb
2c4826de360e9270a3d167bec8111987 82888 database optional
mysql-client_5.5.46-0+deb7u1_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=bhCz
-----END PGP SIGNATURE-----
--- End Message ---