Your message dated Tue, 26 Apr 2016 22:47:09 +0000
with message-id <e1avbl7-00032w...@franck.debian.org>
and subject line Bug#821100: fixed in mysql-5.5 5.5.49-0+deb8u1
has caused the Debian Bug report #821100,
regarding Security fixes from the April 2016 CPU
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
821100: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821100
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: mysql-5.5
Version: 5.5.47-0+deb8u1
Severity: grave
Tags: security upstream fixed-upstream

The Oracle Critical Patch Update for April 2016 will be released on Tuesday, April 19. According to the pre-release announcement [1], it will contain information about CVEs fixed in MySQL 5.5.49.

The CVE numbers will be available when the CPU is released.

Regards,

Norvald H. Ryeng

[1] http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html
--- End Message ---
--- Begin Message ---
Source: mysql-5.5
Source-Version: 5.5.49-0+deb8u1

We believe that the bug you reported is fixed in the latest version of
mysql-5.5, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 821...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated mysql-5.5 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 18 Apr 2016 07:53:29 +0200
Source: mysql-5.5
Binary: libmysqlclient18 libmysqld-pic libmysqld-dev libmysqlclient-dev 
mysql-common mysql-client-5.5 mysql-server-core-5.5 mysql-server-5.5 
mysql-server mysql-client mysql-testsuite mysql-testsuite-5.5 mysql-source-5.5
Architecture: all source
Version: 5.5.49-0+deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Debian MySQL Maintainers <pkg-mysql-ma...@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 821100
Description: 
 libmysqlclient-dev - MySQL database development files
 libmysqlclient18 - MySQL database client library
 libmysqld-dev - MySQL embedded database development files
 libmysqld-pic - PIC version of MySQL embedded server development files
 mysql-client - MySQL database client (metapackage depending on the latest 
versio
 mysql-client-5.5 - MySQL database client binaries
 mysql-common - MySQL database common files, e.g. /etc/mysql/my.cnf
 mysql-server - MySQL database server (metapackage depending on the latest 
versio
 mysql-server-5.5 - MySQL database server binaries and system database setup
 mysql-server-core-5.5 - MySQL database server binaries
 mysql-source-5.5 - MySQL source
 mysql-testsuite - MySQL testsuite
 mysql-testsuite-5.5 - MySQL testsuite
Changes:
 mysql-5.5 (5.5.49-0+deb8u1) jessie-security; urgency=high
 .
   * Imported Upstream version 5.5.49 to fix security issues:
     - http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html
     - CVE-2016-0640 CVE-2016-0641 CVE-2016-0642 CVE-2016-0643 CVE-2016-0644
       CVE-2016-0646 CVE-2016-0647 CVE-2016-0648 CVE-2016-0649 CVE-2016-0650
       CVE-2016-0666 CVE-2016-2047
     (Closes: #821100)
Checksums-Sha1: 
 7ae68a17d02decd9e9057ffb3d54c992603a05c7 3093 mysql-5.5_5.5.49-0+deb8u1.dsc
 74c8ff9e939f81c54fdb932d185548d1f18520d2 21202609 mysql-5.5_5.5.49.orig.tar.gz
 5fb749a58ff1abce2e21595a9bcdc1e647157349 232120 
mysql-5.5_5.5.49-0+deb8u1.debian.tar.xz
 df2763237266a56f03b940c1768cc11109b02db4 81086 
mysql-common_5.5.49-0+deb8u1_all.deb
 216dc1e7141f5e1a51c4857e5956cb33e99abd5e 79328 
mysql-server_5.5.49-0+deb8u1_all.deb
 49f364dbcf503253fa4e8ccbc9495e260a456815 79210 
mysql-client_5.5.49-0+deb8u1_all.deb
 5a7aff8fdf9e898c03af5bb7d1430a5ae34f98aa 79186 
mysql-testsuite_5.5.49-0+deb8u1_all.deb
Checksums-Sha256: 
 c5deca0ce5b6677a1618def71c978e220ebf792d1d2ea6df97ca7b7d3e65c819 3093 
mysql-5.5_5.5.49-0+deb8u1.dsc
 cd9ca49b01a76bca635f2888b9d4d30fa6583dd198994d407cdd0dd7170e9e1f 21202609 
mysql-5.5_5.5.49.orig.tar.gz
 b8edaee1b497c8489a8b9e59e15c3b7ee7ed9e4c82ad01851fffccbf875d8c0f 232120 
mysql-5.5_5.5.49-0+deb8u1.debian.tar.xz
 458009b3205130104bba0833136c6eca8dbc634b181cec6c37a4b969d6478d3d 81086 
mysql-common_5.5.49-0+deb8u1_all.deb
 f03125c52335f99c68e981df68dc7db09e1e392be26f8d22f27908124a6d3d83 79328 
mysql-server_5.5.49-0+deb8u1_all.deb
 15acd8a475ebbcd88ffa1336420d5b8ecfdf06c64a93c0ddbdd71e8177f89ecd 79210 
mysql-client_5.5.49-0+deb8u1_all.deb
 fb36dfa997158ff5aac6162079367a62cb72a7f3ae5b641e4c8870a4d8dabf2d 79186 
mysql-testsuite_5.5.49-0+deb8u1_all.deb
Files: 
 6ecc7fd3d6146861dea5e2eaea62c79c 3093 database optional 
mysql-5.5_5.5.49-0+deb8u1.dsc
 a02028d1e3981d03efd24292e3a734cc 21202609 database optional 
mysql-5.5_5.5.49.orig.tar.gz
 a0acfe143b78c0f5ccd80219bf07e1cc 232120 database optional 
mysql-5.5_5.5.49-0+deb8u1.debian.tar.xz
 9e979ac33573aeaf9c333ad48f408f7c 81086 database optional 
mysql-common_5.5.49-0+deb8u1_all.deb
 c3df4df3d95fdacfb5b3468cda13e24c 79328 database optional 
mysql-server_5.5.49-0+deb8u1_all.deb
 dddb93b12fcb7f0452802f5ba8e376c4 79210 database optional 
mysql-client_5.5.49-0+deb8u1_all.deb
 7f7739ed7fc1706db328240ba08b88d4 79186 database optional 
mysql-testsuite_5.5.49-0+deb8u1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=uWtZ
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to