Your message dated Fri, 20 Jan 2017 15:07:26 +0000
with message-id <e1cuamk-0001yc...@fasolo.debian.org>
and subject line Bug#851234: fixed in mysql-5.6 5.6.35-1
has caused the Debian Bug report #851234,
regarding Security fixes from the January 2017 CPU
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
851234: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851234
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: mysql-5.6
Version: 5.6.34-1
Severity: grave
Tags: security upstream fixed-upstream

The Oracle Critical Patch Update for January 2017 will be released on  
Tuesday, January 17. According to the pre-release announcement [1], it  
will contain information about CVEs fixed in MySQL 5.6.35.

The CVE numbers will be available when the CPU is released.

Regards,

Norvald H. Ryeng

[1] http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html

--- End Message ---
--- Begin Message ---
Source: mysql-5.6
Source-Version: 5.6.35-1

We believe that the bug you reported is fixed in the latest version of
mysql-5.6, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 851...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Lars Tangvald <lars.tangv...@oracle.com> (supplier of updated mysql-5.6 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 17 Jan 2017 12:41:15 +0100
Source: mysql-5.6
Binary: libmysqlclient18 mysql-client-core-5.6 mysql-client-5.6 
mysql-server-core-5.6 mysql-server-5.6 mysql-testsuite-5.6 mysql-source-5.6
Architecture: source
Version: 5.6.35-1
Distribution: unstable
Urgency: high
Maintainer: Debian MySQL Maintainers <pkg-mysql-ma...@lists.alioth.debian.org>
Changed-By: Lars Tangvald <lars.tangv...@oracle.com>
Description:
 libmysqlclient18 - MySQL database client library
 mysql-client-5.6 - MySQL database client binaries
 mysql-client-core-5.6 - MySQL database core client binaries
 mysql-server-5.6 - MySQL database server binaries and system database setup
 mysql-server-core-5.6 - MySQL database server binaries
 mysql-source-5.6 - MySQL source
 mysql-testsuite-5.6 - MySQL 5.6 testsuite
Closes: 847992 848118 851156 851234
Changes:
 mysql-5.6 (5.6.35-1) unstable; urgency=high (security fixes)
 .
   [ Andreas Beckmann ]
   * Stop building the unversioned metapackages, these are now built from
     src:mysql-5.7.
   * mysql-server-core-5.6: Add Breaks+Replaces: mysql-server-5.5 for the moved
     innochecksum manpage.  (Closes: #847992, #848118)
 .
   [ Lars Tangvald ]
   * Imported upstream version 5.6.35 to fix security issues:
     - 
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
     - CVE-2016-8318 CVE-2016-8327 CVE-2017-3238 CVE-2017-3244
     - CVE-2017-3257 CVE-2017-3258 CVE-2017-3265 CVE-2017-3273
     - CVE-2017-3291 CVE-2017-3312 CVE-2017-3313 CVE-2017-3317
     - CVE-2017-3318
     (Closes: #851234)
   * Fix failing test main.events_2
     The test was failing after 2017-01-01 because of a hardcoded date in the 
test
     Added workaround patch, pending upstream fix.
   * Fix ftbfs with newer libedit versions
     The new version had an api change, causing the cmake check to fail.
     (Closes: #851156)
Checksums-Sha1:
 519ca2b073f5c326df6652fd2914ef960dec9861 2735 mysql-5.6_5.6.35-1.dsc
 a971f01d711addd87c860fb534d51139a73d5319 32167628 mysql-5.6_5.6.35.orig.tar.gz
 d79d38229bf08f8550c5624c404ee71e4540afa9 249340 
mysql-5.6_5.6.35-1.debian.tar.xz
Checksums-Sha256:
 9636b1669d928eb28f1f21a49883828901f96695d6be15c26f41d69842130e92 2735 
mysql-5.6_5.6.35-1.dsc
 dddcba169b98844d7c65346cbd791c853edf942d78440381685087b84aa35020 32167628 
mysql-5.6_5.6.35.orig.tar.gz
 af86365a9b64114d5cb685d65082b4a03e257d357a444e1675c2f3547c36a397 249340 
mysql-5.6_5.6.35-1.debian.tar.xz
Files:
 3cfb212766b9325dbb911554268fba7c 2735 database optional mysql-5.6_5.6.35-1.dsc
 e4f170f6f73aa94c0d8da90019545908 32167628 database optional 
mysql-5.6_5.6.35.orig.tar.gz
 a036542f6a3824318c41e726eed7845c 249340 database optional 
mysql-5.6_5.6.35-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Cz1b
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to