From PharmacyUSA-SuperDeals at sktmu.perguruanmuhrawamangun.com Tue Apr 4 04:07:43 2023 From: PharmacyUSA-SuperDeals at sktmu.perguruanmuhrawamangun.com (=?UTF-8?B?UGhhcm1hY3kgVVNBIC0gU3VwZXIgRGVhbHM=?=) Date: Tue, 04 Apr 2023 10:07:43 +0700 Subject: [debian-mysql] =?utf-8?b?8J+SquKAjSBXZSBzaGlwIHdvcmxkd2lkZSA=?= =?utf-8?b?4pmC77iP?= Message-ID: My Customer.Suffer from ED? Super Active Pack is the answer!CLICK HERE NOW -------------- next part -------------- An HTML attachment was scrubbed... URL: From owner at bugs.debian.org Thu Apr 6 08:09:09 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Thu, 06 Apr 2023 07:09:09 +0000 Subject: [debian-mysql] Processed: severity of 1006718 is serious, notfixed 981941 in 1.3.5, tagging 981941, reassign 1031656 to mariadb ... References: <1680764838-282-bts-anbe@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > severity 1006718 serious Bug #1006718 [src:nvidia-graphics-drivers-tesla-418] nvidia-graphics-drivers-tesla-418: EoL (03/2022) driver should not be released with bookworm Severity set to 'serious' from 'normal' > notfixed 981941 1.3.5 Bug #981941 [sysuser-helper] sysuser-helper: Merged-usr transition No longer marked as fixed in versions dh-sysuser/1.3.5 and sysuser-helper/1.3.5. > tags 981941 + sid trixie experimental Bug #981941 [sysuser-helper] sysuser-helper: Merged-usr transition Added tag(s) experimental, sid, and trixie. > reassign 1031656 mariadb 1:10.11.1-1 Bug #1031656 {Done: Debian FTP Masters } [mariadb-10.6,mariadb] MariaDB autopkgtest upstream test suite fails on disk / data corruption on ppc64el Warning: Unknown package 'mariadb-10.6' Bug reassigned from package 'mariadb-10.6,mariadb' to 'mariadb'. Ignoring request to alter found versions of bug #1031656 to the same values previously set No longer marked as fixed in versions 1:10.6.11-2+rm. Bug #1031656 {Done: Debian FTP Masters } [mariadb] MariaDB autopkgtest upstream test suite fails on disk / data corruption on ppc64el There is no source info for the package 'mariadb' at version '1:10.11.1-1' with architecture '' Unable to make a source version for version '1:10.11.1-1' Marked as found in versions 1:10.11.1-1. > reopen 1031656 Bug #1031656 {Done: Debian FTP Masters } [mariadb] MariaDB autopkgtest upstream test suite fails on disk / data corruption on ppc64el Bug reopened Ignoring request to alter fixed versions of bug #1031656 to the same values previously set > tags 984056 + experimental Bug #984056 {Done: David da Silva Polverari } [src:ifhp] ifhp: ftbfs with GCC-11 Added tag(s) experimental. > tags 1033428 + experimental Bug #1033428 [src:tycho] tycho: FTBFS in testing: make[1]: *** [debian/rules:9: override_dh_auto_build] Error 25 Added tag(s) experimental. > retitle 1033428 tycho: FTBFS: incompatible types: org.osgi.framework.BundleContext cannot be converted to javax.xml.parsers.SAXParserFactory Bug #1033428 [src:tycho] tycho: FTBFS in testing: make[1]: *** [debian/rules:9: override_dh_auto_build] Error 25 Changed Bug title to 'tycho: FTBFS: incompatible types: org.osgi.framework.BundleContext cannot be converted to javax.xml.parsers.SAXParserFactory' from 'tycho: FTBFS in testing: make[1]: *** [debian/rules:9: override_dh_auto_build] Error 25'. > found 1033865 0.0~git20170207.0.428b7c6-6 Bug #1033865 [src:golang-github-go-macaron-csrf] Don't release with bookworm Marked as found in versions golang-github-go-macaron-csrf/0.0~git20170207.0.428b7c6-6. > retitle 1030905 sardana: FTBFS with python3.11 (cannot import name 'getargspec' from 'sphinx.util.inspect') Bug #1030905 [src:sardana] sardana: FTBFS (cannot import name 'getargspec' from 'sphinx.util.inspect') Changed Bug title to 'sardana: FTBFS with python3.11 (cannot import name 'getargspec' from 'sphinx.util.inspect')' from 'sardana: FTBFS (cannot import name 'getargspec' from 'sphinx.util.inspect')'. > tags 1030905 + sid bookworm Bug #1030905 [src:sardana] sardana: FTBFS with python3.11 (cannot import name 'getargspec' from 'sphinx.util.inspect') Added tag(s) bookworm and sid. > thanks Stopping processing here. Please contact me if you need assistance. -- 1006718: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006718 1030905: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030905 1031656: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031656 1033428: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033428 1033865: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033865 981941: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981941 984056: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984056 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From otto at debian.org Sun Apr 9 04:07:02 2023 From: otto at debian.org (Otto =?UTF-8?Q?Kek=C3=A4l=C3=A4inen?=) Date: Sat, 8 Apr 2023 20:07:02 -0700 Subject: [debian-mysql] Bug#1031863: libqt5sql5-mysql: incompatible change in libmariadb3 breaks kontact, needs upstream fix in libqt5sql5-mysql In-Reply-To: <27097567.0z3mx4SrDP@atlantik> References: <4500305.qgaIjWLANL@jason> <2133811.2rDFExlDS0@jason> <27097567.0z3mx4SrDP@atlantik> <167724875870.7495.3941412817663608649.reportbug@jason> Message-ID: Hi! I updated today https://salsa.debian.org/mariadb-team/mariadb-10.3/-/merge_requests/36. I would appreciate some eyes to review it and thumbs up if you want me to proceed with this. - Otto Related for context: - https://salsa.debian.org/mariadb-team/mariadb-10.3/-/merge_requests/36 - upstream PR of above https://github.com/mariadb-corporation/mariadb-connector-c/pull/219 - bug reports in Debian for MariaDB 10.3: - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031773 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031863 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031770 - Also for 10.5: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033654 - and MR https://salsa.debian.org/mariadb-team/mariadb-10.5/-/merge_requests/13 (will be updated and merged after the 10.3 one) - mariadb-config vs libmariadb.pc version oddity: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024241 - mariadb-config lib path oddity: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001843 - upstream PR to simplify mariadb.pc vs libmariadb.pc: https://github.com/MariaDB/server/pull/1800 From dominik.perkowski at socialglobal.pl Fri Apr 14 08:40:16 2023 From: dominik.perkowski at socialglobal.pl (Dominik Perkowski) Date: Fri, 14 Apr 2023 07:40:16 GMT Subject: [debian-mysql] Pozycjonowanie- informacja Message-ID: <20230414064500-0.1.5e.1icry.0.4ile2d8idx@socialglobal.pl> Dzie? dobry, jaki? czas temu zg?osi?a si? do nas firma, kt?rej strona internetowa nie pozycjonowa?a si? wysoko w wyszukiwarce Google. Na podstawie wykonanego przez nas audytu SEO zoptymalizowali?my tre?ci na stronie pod k?tem wcze?niej opracowanych s??w kluczowych. Nasz wewn?trzny system codziennie analizuje prawid?owe dzia?anie witryny. Dzi?ki indywidualnej strategii, firma zdobywa coraz wi?cej Klient?w. Czy chcieliby Pa?stwo zwi?kszy? liczb? os?b odwiedzaj?cych stron? internetow? firmy? M?g?bym przedstawi? ofert?? Pozdrawiam serdecznie, Dominik Perkowski From theo.lopez15 at icloud.com Fri Apr 14 12:52:35 2023 From: theo.lopez15 at icloud.com (Geek Services) Date: Fri, 14 Apr 2023 11:52:35 +0000 Subject: [debian-mysql] Service Plan details for GKSQD/APR14/10253117 Message-ID: <27836a24-f1f4-c9b3-ff25-c80a04b9af1f@icloud.com> ** *Your Service Receipt* Hi Geek-Squad User, We hope you're enjoying our services! We are glad to inform you that your annual plan with us has been successfully renewed. Your Geek Secure service plan GKSQD/APR14/10253117 is now valid till 14th Apr 2024. *Service-Desk: 855 250 8732* *Details:* Geek 360 Subscription (Annual services for 03 devices) *Total:* USD 246.17 Amount charged will show in your history within 48Hrs. You can cancel this service plan within 24Hrs of renewal by giving us a call at the above number. *GEEK**SQUAD***** Geeks, 5 Canal Park, Cambridge, MA 02141, USA, Unsubscribe -------------- next part -------------- An HTML attachment was scrubbed... URL: From ftpmaster at ftp-master.debian.org Sat Apr 15 22:57:11 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Sat, 15 Apr 2023 21:57:11 +0000 Subject: [debian-mysql] Processing of galera-4_26.4.14-1~exp1_source.changes Message-ID: galera-4_26.4.14-1~exp1_source.changes uploaded successfully to localhost along with the files: galera-4_26.4.14-1~exp1.dsc galera-4_26.4.14.orig.tar.gz galera-4_26.4.14.orig.tar.gz.asc galera-4_26.4.14-1~exp1.debian.tar.xz galera-4_26.4.14-1~exp1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Sat Apr 15 23:04:05 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Sat, 15 Apr 2023 22:04:05 +0000 Subject: [debian-mysql] galera-4_26.4.14-1~exp1_source.changes ACCEPTED into experimental Message-ID: Thank you for your contribution to Debian. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 15 Apr 2023 14:27:31 -0700 Source: galera-4 Binary: galera-4 galera-arbitrator-4 Architecture: source Version: 26.4.14-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian MySQL Maintainers Changed-By: Otto Kek?l?inen Description: galera-4 - Replication framework for transactional applications galera-arbitrator-4 - Galera arbitrator daemon Closes: 970045 Changes: galera-4 (26.4.14-1~exp1) experimental; urgency=medium . [ Otto Kek?l?inen ] * New upstream release 26.4.14. Includes multiple bug fixes, see https://github.com/codership/documentation/blob/master/release-notes/release-notes-galera-26.4.14.txt . [ Faustin Lammler ] * Running daemon under nobody user is not recommended (Closes: #970045) Checksums-Sha1: 95f98ccfffe309a0773a7cff02339667aab3f7de 2368 galera-4_26.4.14-1~exp1.dsc 5bf1ba3e82cf90bca61bf9f5f499df13f1d875fa 1532285 galera-4_26.4.14.orig.tar.gz 4bcf075641069223c49c420ecfc35e1c329bc191 488 galera-4_26.4.14.orig.tar.gz.asc 7b0e304c2ff8702d88c1a9f36dd97b062d2aeb68 18224 galera-4_26.4.14-1~exp1.debian.tar.xz 1ba87721fd09759ecf6f1eb004f734fda40c5ac0 8385 galera-4_26.4.14-1~exp1_source.buildinfo Checksums-Sha256: 031367107b27b1bab3cc8d37c5658a76423a4d75c46604798e524476e61f3a91 2368 galera-4_26.4.14-1~exp1.dsc 7ec9d88e1b91825847afd10fb052e80dc9e07b85819bff59631e46b8deea0037 1532285 galera-4_26.4.14.orig.tar.gz a478c5519fda4757a355ed49f31522a2bd43ac5916a827fa5f17c68491a2a515 488 galera-4_26.4.14.orig.tar.gz.asc e798743014987a9d3da7981af9c18c33e065e721c716751f33834448fdb77168 18224 galera-4_26.4.14-1~exp1.debian.tar.xz 9f9e40c86deafff826d035568728ed4e4f9c7db2b2b955793aa54d3953fea85f 8385 galera-4_26.4.14-1~exp1_source.buildinfo Files: 8ed7b61ac297feb54692cd62a13115c8 2368 database optional galera-4_26.4.14-1~exp1.dsc 48773cc6e91133319300ba63447ae2f7 1532285 database optional galera-4_26.4.14.orig.tar.gz b79e74683c1f3ff5c2aaf886a38f7677 488 database optional galera-4_26.4.14.orig.tar.gz.asc f2fba29432b58b0d0ef09ab4b5e45c56 18224 database optional galera-4_26.4.14-1~exp1.debian.tar.xz e583f132ec3ed3c95b9765bd647d9e97 8385 database optional galera-4_26.4.14-1~exp1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEmbRSsR88dMO0U+RvvthEn87o2ogFAmQ7GEgACgkQvthEn87o 2oiGBxAAhP9qZkj1eFfd4xOb+srDpSvyCoFkzTCZMB+FWqWDCedTAcHvriwvodzS mXnTS3S7vIpFCHSF6DEGlKALjec+Uo6qIeCSzbfLl35AN20u/T6q2/1RPrB6wnIK f7cB6XUxZJ7S0FBhCkeEi9YxhTOamYAiH5+1Oe6gSKL6q1We/dkNiTlZIhaASpGD vWCadDl8n91AwpGFLANGvhw9ZAliaItQTjWZgQ4NeI+hF1ZceRGXcNojPpaDfnlr bou+f5C5MWQrYXmnGerwW1Dk9quVTWmoqjhp0tLSDcXdp051UUPZASGITdNs2bVf d+8aQSzt6j/VHJ4I4L6qYegzLf4AeoZQXV/hWx9S2GiTboNYjDHUI9SYU0cj0adK qk9mI056RxvCs0W+r2F+FNZmko7+v2zdlTfo5hhrsvxQboJk/IViwq/pi8SIea7+ vKZakwkW2a0+1I/U3Dz6gx1eXBe0iDbFe+uE7HWBFlHwVlyyo1AMts1syPIm92K3 joZRHW6cQA4H55ulyLilso6fw1ciMoaz+lEETq2BlenV9I0p46D6s3ZDF4WPgsvJ 4N1HOd4NYk/04YQbo9nq8QQd7Ot1TdB9fiTC5ppyW94FQQ+UkRdY+/o0mF0Gra4N vZ+iMGjcMW+C32sAl6wx4zPoeNYOWZ61b44jpFmHAbnzP/Z3ddc= =5F5Z -----END PGP SIGNATURE----- From owner at bugs.debian.org Sat Apr 15 23:09:20 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 15 Apr 2023 22:09:20 +0000 Subject: [debian-mysql] Bug#970045: marked as done (galera-4: Use user "_galera" instead of "nobody" to run the daemon) References: Message-ID: Your message dated Sat, 15 Apr 2023 22:04:05 +0000 with message-id and subject line Bug#970045: fixed in galera-4 26.4.14-1~exp1 has caused the Debian Bug report #970045, regarding galera-4: Use user "_galera" instead of "nobody" to run the daemon to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 970045: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970045 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: =?UTF-8?B?T3R0byBLZWvDpGzDpGluZW4=?= Subject: galera-4: Use user "_galera" instead of "nobody" to run the daemon Date: Thu, 10 Sep 2020 22:43:43 +0300 Size: 3009 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#970045: fixed in galera-4 26.4.14-1~exp1 Date: Sat, 15 Apr 2023 22:04:05 +0000 Size: 7344 URL: From owner at bugs.debian.org Sun Apr 16 06:33:11 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sun, 16 Apr 2023 05:33:11 +0000 Subject: [debian-mysql] Processed: reopening 1009290, reassign 1009290 to mariadb-server, reopening 1007216 ..., reopening 1007219 ... References: <1681623076-1590-bts-anbe@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > reopen 1009290 Bug #1009290 {Done: Debian FTP Masters } [mariadb-server-10.6] mariadb-server-10.6: Fails to start on live system Warning: Unknown package 'mariadb-server-10.6' 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened Warning: Unknown package 'mariadb-server-10.6' Warning: Unknown package 'mariadb-server-10.6' No longer marked as fixed in versions 1:10.6.11-2+rm. Warning: Unknown package 'mariadb-server-10.6' > reassign 1009290 mariadb-server 1:10.6.7-3 Bug #1009290 [mariadb-server-10.6] mariadb-server-10.6: Fails to start on live system Warning: Unknown package 'mariadb-server-10.6' Bug reassigned from package 'mariadb-server-10.6' to 'mariadb-server'. No longer marked as found in versions mariadb-10.6/1:10.6.7-3. Ignoring request to alter fixed versions of bug #1009290 to the same values previously set Bug #1009290 [mariadb-server] mariadb-server-10.6: Fails to start on live system Marked as found in versions mariadb-10.6/1:10.6.7-3. > reopen 1007216 Bug #1007216 {Done: Debian FTP Masters } [src:mariadb-10.6] mariadb-10.6: FTBFS on ppc64: unrecognized opcode tbegin/tabort/tend Warning: Unknown package 'src:mariadb-10.6' 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened Warning: Unknown package 'src:mariadb-10.6' Warning: Unknown package 'src:mariadb-10.6' No longer marked as fixed in versions 1:10.6.11-2+rm. Warning: Unknown package 'src:mariadb-10.6' > reassign 1007216 src:mariadb 1:10.6.7-1 Bug #1007216 [src:mariadb-10.6] mariadb-10.6: FTBFS on ppc64: unrecognized opcode tbegin/tabort/tend Warning: Unknown package 'src:mariadb-10.6' Bug reassigned from package 'src:mariadb-10.6' to 'src:mariadb'. No longer marked as found in versions mariadb-10.6/1:10.6.7-1. Ignoring request to alter fixed versions of bug #1007216 to the same values previously set Bug #1007216 [src:mariadb] mariadb-10.6: FTBFS on ppc64: unrecognized opcode tbegin/tabort/tend The source 'mariadb' and version '1:10.6.7-1' do not appear to match any binary packages Marked as found in versions mariadb/1:10.6.7-1. > reopen 1007219 Bug #1007219 {Done: Debian FTP Masters } [src:mariadb-10.6] mariadb-10.6: FTBFS on sparc64: server crash on test Warning: Unknown package 'src:mariadb-10.6' 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened Warning: Unknown package 'src:mariadb-10.6' Warning: Unknown package 'src:mariadb-10.6' No longer marked as fixed in versions 1:10.6.11-2+rm. Warning: Unknown package 'src:mariadb-10.6' > reassign 1007219 src:mariadb 1:10.6.7-3 Bug #1007219 [src:mariadb-10.6] mariadb-10.6: FTBFS on sparc64: server crash on test Warning: Unknown package 'src:mariadb-10.6' Bug reassigned from package 'src:mariadb-10.6' to 'src:mariadb'. No longer marked as found in versions mariadb-10.6/1:10.6.7-3. Ignoring request to alter fixed versions of bug #1007219 to the same values previously set Bug #1007219 [src:mariadb] mariadb-10.6: FTBFS on sparc64: server crash on test The source 'mariadb' and version '1:10.6.7-3' do not appear to match any binary packages Marked as found in versions mariadb/1:10.6.7-3. > reopen 996706 Bug #996706 {Done: Debian FTP Masters } [mariadb-server-core-10.6] mariadb-server-10.5: run directory is not created in multi-instance mode Warning: Unknown package 'mariadb-server-core-10.6' 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened Warning: Unknown package 'mariadb-server-core-10.6' Warning: Unknown package 'mariadb-server-core-10.6' No longer marked as fixed in versions 1:10.6.11-2+rm. Warning: Unknown package 'mariadb-server-core-10.6' > reassign 996706 mariadb-server-core 1:10.6.5-1 Bug #996706 [mariadb-server-core-10.6] mariadb-server-10.5: run directory is not created in multi-instance mode Warning: Unknown package 'mariadb-server-core-10.6' Bug reassigned from package 'mariadb-server-core-10.6' to 'mariadb-server-core'. No longer marked as found in versions mariadb-10.6/1:10.6.5-1. Ignoring request to alter fixed versions of bug #996706 to the same values previously set Bug #996706 [mariadb-server-core] mariadb-server-10.5: run directory is not created in multi-instance mode There is no source info for the package 'mariadb-server-core' at version '1:10.6.5-1' with architecture '' Unable to make a source version for version '1:10.6.5-1' Marked as found in versions 1:10.6.5-1. > reopen 1006702 Bug #1006702 {Done: Debian FTP Masters } [src:mariadb-10.6] mariadb-10.6: Baseline violation on at least i386 via CXXFLAGS Warning: Unknown package 'src:mariadb-10.6' 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened Warning: Unknown package 'src:mariadb-10.6' Warning: Unknown package 'src:mariadb-10.6' No longer marked as fixed in versions 1:10.6.11-2+rm. Warning: Unknown package 'src:mariadb-10.6' > reassign 1006702 src:mariadb 1:10.6.7-2 Bug #1006702 [src:mariadb-10.6] mariadb-10.6: Baseline violation on at least i386 via CXXFLAGS Warning: Unknown package 'src:mariadb-10.6' Bug reassigned from package 'src:mariadb-10.6' to 'src:mariadb'. No longer marked as found in versions mariadb-10.6/1:10.6.7-2. Ignoring request to alter fixed versions of bug #1006702 to the same values previously set Bug #1006702 [src:mariadb] mariadb-10.6: Baseline violation on at least i386 via CXXFLAGS The source 'mariadb' and version '1:10.6.7-2' do not appear to match any binary packages Marked as found in versions mariadb/1:10.6.7-2. > thanks Stopping processing here. Please contact me if you need assistance. -- 1006702: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006702 1007216: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007216 1007219: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007219 1009290: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009290 996706: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996706 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From ftpmaster at ftp-master.debian.org Fri Apr 21 06:29:13 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 21 Apr 2023 05:29:13 +0000 Subject: [debian-mysql] Processing of galera-3_25.3.37-0+deb11u1_source.changes Message-ID: galera-3_25.3.37-0+deb11u1_source.changes uploaded successfully to localhost along with the files: galera-3_25.3.37-0+deb11u1.dsc galera-3_25.3.37.orig.tar.gz galera-3_25.3.37.orig.tar.gz.asc galera-3_25.3.37-0+deb11u1.debian.tar.xz galera-3_25.3.37-0+deb11u1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Fri Apr 21 06:33:56 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 21 Apr 2023 05:33:56 +0000 Subject: [debian-mysql] galera-3_25.3.37-0+deb11u1_source.changes ACCEPTED into proposed-updates->stable-new Message-ID: Thank you for your contribution to Debian. Mapping bullseye to stable. Mapping stable to proposed-updates. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 15 Apr 2023 12:14:05 -0700 Source: galera-3 Binary: galera-3 galera-arbitrator-3 Architecture: source Version: 25.3.37-0+deb11u1 Distribution: bullseye Urgency: medium Maintainer: Debian MySQL Maintainers Changed-By: Otto Kek?l?inen Description: galera-3 - Replication framework for transactional applications galera-arbitrator-3 - Galera arbitrator daemon Changes: galera-3 (25.3.37-0+deb11u1) bullseye; urgency=medium . * New upstream version 25.3.37. Includes multiple bug fixes, see https://github.com/codership/documentation/blob/master/release-notes/release-notes-galera-25.3.37.txt - Arbitrator daemon garbd now has parameters -w, --workdir and WORK_DIR in garb.conf which can be used to set the working directory for garbd process, which helps to fix long standing issue from 2015 (https://github.com/codership/galera/issues/313). Checksums-Sha1: a5667a77dd7f039b9ed4811bd6db251a26ac0ff9 2408 galera-3_25.3.37-0+deb11u1.dsc e65fe0eeeda5cdd805fb9ebd180287f2c73fc658 1282455 galera-3_25.3.37.orig.tar.gz 3b75c6b5ef89bb4a7f8402aedfa676ea44760921 488 galera-3_25.3.37.orig.tar.gz.asc 9458444e9b1acede987a96776a1cff00790d6214 16372 galera-3_25.3.37-0+deb11u1.debian.tar.xz b2439dece7f3a94e66aa02018e32162a987d8554 8397 galera-3_25.3.37-0+deb11u1_source.buildinfo Checksums-Sha256: 15b98484bec535e15074fff9d292ca3192f966a67f2b4e902e37a005b2eb9850 2408 galera-3_25.3.37-0+deb11u1.dsc 8997e80dd8afbc9c335ebb00ad68dfe799a917e3144f6befb76678e8f1be8cda 1282455 galera-3_25.3.37.orig.tar.gz a5c4678297ec5d358aa2020bb215a9b2e89dc57c95e66c47c7cc796f634c5aa3 488 galera-3_25.3.37.orig.tar.gz.asc f0d24a9dfd4f982a04947e0be9ce041ba6cfad5cb960cee0bab1c635f065631f 16372 galera-3_25.3.37-0+deb11u1.debian.tar.xz 14bd4a543a9063b19e92b927ef7154090fa09ef9fce82e49ecd0c776b60af613 8397 galera-3_25.3.37-0+deb11u1_source.buildinfo Files: b2e089034f42083b7f852e8b856417b9 2408 database optional galera-3_25.3.37-0+deb11u1.dsc deed69f2302b8e606b82b3056fb83081 1282455 database optional galera-3_25.3.37.orig.tar.gz d5efe35ed3ac56eb5efbe4d6fe761463 488 database optional galera-3_25.3.37.orig.tar.gz.asc 031f87b3bc679490fd65fc539167d38d 16372 database optional galera-3_25.3.37-0+deb11u1.debian.tar.xz fb133656c9c6498a591b65a475bff23c 8397 database optional galera-3_25.3.37-0+deb11u1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEmbRSsR88dMO0U+RvvthEn87o2ogFAmRCGLYACgkQvthEn87o 2oh9Nw//fSONL+/gW526lhZKzgUYOsDoSv6YGDObkaJ7tCxghKfaP8tQR6jG3lKG PJziOXhXU39rHcvBzITNUsuo+WiX3EmYdqTd4oJFrNdA3vjHUMsVFMVzk/5ZZhPy kMwHF+xO4sBS/Qpmu3Ekh2NApGPfvtpvflNQuuaGVJ6JhobmeXRkyrPbkmWUAIaX jPZs45x0++FTaNqdAhhFj2HUjRomHCvk4FRKyGPy4yR3oCcKGMFpTnxirwiFmkqa xn5TBuFPokI/zjNAfyVUTzjWQQX6QiAsC9SvZ5W0JubZEd/yMn8mbyi3RuGKgIIE 1VJBrG+O5ltKhK48IPHh/qjEP34qr5FP5knhd2lhpPFLHA7q47Afn7e0i7yRB0jG vb3SgaCvGXJCQeotAsli5w9L0fNCItI4wck+QBMvMyYTljOKi5fcUthjnGFXs2rv ziD8ZAt8i5fIZqbFY7BEBBeOOYNMwDRVfkJzyD1OVMYb7YM3wU0+00ewpKgKWiDd LDd6nBDP1ygcA4F5c5mjSQPQ5iNyDCcMmMYpxOsGcWRoy6ceec6VNVF868559k4t DS7IIu9/Xu0MSMRmwn4k02suNl0icFMfhZlxDj6w3hUDXXg71XJwDj81DGP1mH6s DMFsm2qy8y6dJ1XQHtbSjNSr0fL+GGyM+NoPCgvR0ynydVY7gLU= =ItPT -----END PGP SIGNATURE----- From ftpmaster at ftp-master.debian.org Fri Apr 21 06:44:13 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 21 Apr 2023 05:44:13 +0000 Subject: [debian-mysql] Processing of mariadb_10.11.2-3_source.changes Message-ID: mariadb_10.11.2-3_source.changes uploaded successfully to localhost along with the files: mariadb_10.11.2-3.dsc mariadb_10.11.2-3.debian.tar.xz mariadb_10.11.2-3_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) From owner at bugs.debian.org Fri Apr 21 06:45:11 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Fri, 21 Apr 2023 05:45:11 +0000 Subject: [debian-mysql] Processed: Debian bugs control References: <1682055832.875916.9772.nullmailer@XPS-13-9370> Message-ID: Processing commands for control at bugs.debian.org: > retitle 1032407 MariaDB cannot log to a file unless manually mkdir -p /var/log/mysql Bug #1032407 [mariadb-server] Cannot start mariadb-server unless manually mkdir -p /var/lib/mysql Changed Bug title to 'MariaDB cannot log to a file unless manually mkdir -p /var/log/mysql' from 'Cannot start mariadb-server unless manually mkdir -p /var/lib/mysql'. > severity 1031863 normal Bug #1031863 [mariadb-10.3] libqt5sql5-mysql: incompatible change in libmariadb3 breaks kontact, needs upstream fix in libqt5sql5-mysql Bug #1031773 [mariadb-10.3] mariadb-10.3.38.0+deb10u1: kmail fails after upgrading mariadb to 10.3.38.0+deb10u1 Bug #1031860 [mariadb-10.3] kmail with akonadi stops working after security-upgrade of '*mariadb*' Ignoring request to change severity of Bug 1031863 to the same value. Ignoring request to change severity of Bug 1031773 to the same value. Ignoring request to change severity of Bug 1031860 to the same value. > reassign 1033654 mariadb-10.5 Bug #1033654 [libmariadb3] akonadi broken with libmariadb from s-p-u Bug reassigned from package 'libmariadb3' to 'mariadb-10.5'. No longer marked as found in versions mariadb-10.5/1:10.5.19-0+deb11u1. Ignoring request to alter fixed versions of bug #1033654 to the same values previously set > forwarded 971005 https://jira.mariadb.org/browse/MDEV-31103 Bug #971005 [mariadb-server] make it harder to accidentally use the bundled readline Set Bug forwarded-to-address to 'https://jira.mariadb.org/browse/MDEV-31103'. > thanks Stopping processing here. Please contact me if you need assistance. -- 1031773: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031773 1031860: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031860 1031863: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031863 1032407: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032407 1033654: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033654 971005: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971005 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From ftpmaster at ftp-master.debian.org Fri Apr 21 06:52:41 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 21 Apr 2023 05:52:41 +0000 Subject: [debian-mysql] mariadb_10.11.2-3_source.changes ACCEPTED into unstable Message-ID: Thank you for your contribution to Debian. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 20 Apr 2023 21:48:51 -0700 Source: mariadb Binary: libmariadb-dev libmariadb-dev-compat libmariadb3 libmariadbd19 libmariadbd-dev mariadb-common mariadb-client-core mariadb-client mariadb-server-core mariadb-server mariadb-backup mariadb-plugin-connect mariadb-plugin-s3 mariadb-plugin-rocksdb mariadb-plugin-oqgraph mariadb-plugin-mroonga mariadb-plugin-spider mariadb-plugin-gssapi-server mariadb-plugin-gssapi-client mariadb-plugin-cracklib-password-check mariadb-plugin-hashicorp-key-management mariadb-plugin-provider-bzip2 mariadb-plugin-provider-lz4 mariadb-plugin-provider-lzma mariadb-plugin-provider-lzo mariadb-plugin-provider-snappy mariadb-test mariadb-test-data Architecture: source Version: 1:10.11.2-3 Distribution: unstable Urgency: medium Maintainer: Debian MySQL Maintainers Changed-By: Otto Kek?l?inen Description: libmariadb-dev - MariaDB database development files libmariadb-dev-compat - MariaDB Connector/C, compatibility symlinks libmariadb3 - MariaDB database client library libmariadbd-dev - MariaDB embedded database, development files libmariadbd19 - MariaDB embedded database, shared library mariadb-backup - Backup tool for MariaDB server mariadb-client - MariaDB database client binaries mariadb-client-core - MariaDB database core client binaries mariadb-common - MariaDB common configuration files mariadb-plugin-connect - Connect storage engine for MariaDB mariadb-plugin-cracklib-password-check - CrackLib Password Validation Plugin for MariaDB mariadb-plugin-gssapi-client - GSSAPI authentication plugin for MariaDB client mariadb-plugin-gssapi-server - GSSAPI authentication plugin for MariaDB server mariadb-plugin-hashicorp-key-management - Hashicorp Key Management plugin for MariaDB mariadb-plugin-mroonga - Mroonga storage engine for MariaDB mariadb-plugin-oqgraph - OQGraph storage engine for MariaDB mariadb-plugin-provider-bzip2 - BZip2 compression support in the server and storage engines mariadb-plugin-provider-lz4 - LZ4 compression support in the server and storage engines mariadb-plugin-provider-lzma - LZMA compression support in the server and storage engines mariadb-plugin-provider-lzo - LZO compression support in the server and storage engines mariadb-plugin-provider-snappy - Snappy compression support in the server and storage engines mariadb-plugin-rocksdb - RocksDB storage engine for MariaDB mariadb-plugin-s3 - Amazon S3 archival storage engine for MariaDB mariadb-plugin-spider - Spider storage engine for MariaDB mariadb-server - MariaDB database server binaries mariadb-server-core - MariaDB database core server files mariadb-test - MariaDB database regression test suite mariadb-test-data - MariaDB database regression test suite - data files Changes: mariadb (1:10.11.2-3) unstable; urgency=medium . * Fix typo in autopkgtests configuration-tracing affecting armhf and armel * Revert: Sync downstream (where applicable) with upstream 10.11 debian/* contents so that using diff/meld to compare changes are easier - Revert on suggestion by Debian release managers the changes done by upstreams devs in https://github.com/MariaDB/server/commit/952af4a1 for MariaDB 10.5.19, 10.6.12, 10.11.2 etc. It was deemed too invasive for the Debian 12 "Bookworm" release this late in the release cycle. Checksums-Sha1: be83393bc84dc54c511b55f2d0d4a00bdf32b00e 5213 mariadb_10.11.2-3.dsc 9a2d1ed52a37627e8316c5bb9b1b69489f4bb899 398828 mariadb_10.11.2-3.debian.tar.xz 19ba3528fc1ca070c91251d389143474e1a0abb4 9522 mariadb_10.11.2-3_source.buildinfo Checksums-Sha256: 067b1860572afa73063bb6e3e49a0b8d5c1eeb1ec7bbb4fa29bd2d5d4cac6d89 5213 mariadb_10.11.2-3.dsc f840dc96af8fbc81bd97294f8feb3dccb88e4692ed497209ca15d4deb553a0c9 398828 mariadb_10.11.2-3.debian.tar.xz 53f2af3000a1aa15924aa14c61926d7f0e58893178538b79e2eeaccb18ad9d51 9522 mariadb_10.11.2-3_source.buildinfo Files: 385ffcd7aaeea0d857db40cde14be9ca 5213 database optional mariadb_10.11.2-3.dsc 27ff9756e4e2be9a0f70c19649c0e4f6 398828 database optional mariadb_10.11.2-3.debian.tar.xz 82a3b7fed5dd3c53e5a6a7f2e67ddbe5 9522 database optional mariadb_10.11.2-3_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEmbRSsR88dMO0U+RvvthEn87o2ogFAmRCFxUACgkQvthEn87o 2ojQThAAvQYhA127/u6DM/c7o9WMlIKPsh9IrMgDwSTWxj68kkJqVn0/htmjT3v4 ALDaBqurxtGH6HRszPrl/01YF2vDMFGU1ZGOsub8VAgoy31YXfSGtv5TSL2LiNk1 WVZuuQTcvwO60lAy3pezojNVFK1WeFx56af9nYGFJYePwC2CBmzWtmJCx1ZcmaK7 V+YBJVNfKcJP3+tJZbAirviDqspgcM2k4x0FEKDs6ySYDDnjbBz6F6roDcB4BipB YU3dZ9jqSYYXbjPWaEGqBnplKYYD57nflWe81Aq/PoqJ3MwkoMGwlwbRQv8UCJe4 Om8xik4/XrIa1SZ3q2x9a1MEcSjyokHgouurD1pkOHwXpqnhyADsjeN1k6k3hfyO GIZiQXBwlTCsBSddzL8DO9fEu4gXlKH5CSVNDNsokTY5VDgztTZKdZ71Jl9fvEE1 vLiRHgudLN2/ZF6hhvTWT6+s9QXGqkBEC9pDexREUanzKx/pJu/YvcvZq/xeaFcy nT7TEgDbp9wsW4wr5uH2ZY07Bgl/e3wchlpra5eFKhD5cV7PAa5Wce+RFk2tBEMP UM+tnRTzbzO61WfPyccXcjAXTzQZaDvJFfa1+lithveJiS1cPNns9NY7ppSPDJ4E Rr7s5Fl8PI4VzIVeLehxJcWJj3yTuAMbLZEYM9EgRYkOrRpGiW8= =yD2q -----END PGP SIGNATURE----- From ftpmaster at ftp-master.debian.org Fri Apr 21 07:09:14 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 21 Apr 2023 06:09:14 +0000 Subject: [debian-mysql] Processing of mariadb-10.5_10.5.19-0+deb11u2_source.changes Message-ID: mariadb-10.5_10.5.19-0+deb11u2_source.changes uploaded successfully to localhost along with the files: mariadb-10.5_10.5.19-0+deb11u2.dsc mariadb-10.5_10.5.19-0+deb11u2.debian.tar.xz mariadb-10.5_10.5.19-0+deb11u2_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Fri Apr 21 07:19:13 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 21 Apr 2023 06:19:13 +0000 Subject: [debian-mysql] mariadb-10.5_10.5.19-0+deb11u2_source.changes ACCEPTED into proposed-updates->stable-new Message-ID: Thank you for your contribution to Debian. Mapping bullseye to stable. Mapping stable to proposed-updates. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 15 Apr 2023 12:50:35 -0700 Source: mariadb-10.5 Binary: libmariadb-dev libmariadb-dev-compat libmariadb3 libmariadbd19 libmariadbd-dev mariadb-common mariadb-client-core-10.5 mariadb-client-10.5 mariadb-server-core-10.5 mariadb-server-10.5 mariadb-server mariadb-client mariadb-backup mariadb-plugin-connect mariadb-plugin-s3 mariadb-plugin-rocksdb mariadb-plugin-oqgraph mariadb-plugin-mroonga mariadb-plugin-spider mariadb-plugin-gssapi-server mariadb-plugin-gssapi-client mariadb-plugin-cracklib-password-check mariadb-test mariadb-test-data Architecture: source Version: 1:10.5.19-0+deb11u2 Distribution: bullseye Urgency: medium Maintainer: Debian MySQL Maintainers Changed-By: Otto Kek?l?inen Description: libmariadb-dev - MariaDB database development files libmariadb-dev-compat - MariaDB Connector/C, compatibility symlinks libmariadb3 - MariaDB database client library libmariadbd-dev - MariaDB embedded database, development files libmariadbd19 - MariaDB embedded database, shared library mariadb-backup - Backup tool for MariaDB server mariadb-client - MariaDB database client (metapackage depending on the latest vers mariadb-client-10.5 - MariaDB database client binaries mariadb-client-core-10.5 - MariaDB database core client binaries mariadb-common - MariaDB common configuration files mariadb-plugin-connect - Connect storage engine for MariaDB mariadb-plugin-cracklib-password-check - CrackLib Password Validation Plugin for MariaDB mariadb-plugin-gssapi-client - GSSAPI authentication plugin for MariaDB client mariadb-plugin-gssapi-server - GSSAPI authentication plugin for MariaDB server mariadb-plugin-mroonga - Mroonga storage engine for MariaDB mariadb-plugin-oqgraph - OQGraph storage engine for MariaDB mariadb-plugin-rocksdb - RocksDB storage engine for MariaDB mariadb-plugin-s3 - Amazon S3 archival storage engine for MariaDB mariadb-plugin-spider - Spider storage engine for MariaDB mariadb-server - MariaDB database server (metapackage depending on the latest vers mariadb-server-10.5 - MariaDB database server binaries mariadb-server-core-10.5 - MariaDB database core server files mariadb-test - MariaDB database regression test suite mariadb-test-data - MariaDB database regression test suite - data files Closes: 1033654 Changes: mariadb-10.5 (1:10.5.19-0+deb11u2) bullseye; urgency=medium . * Add patch to revert upstream libmariadb API change (Closes: #1033654) Checksums-Sha1: fdeb56de65b4d4e4936a0fd70135d11a8c8d6102 4814 mariadb-10.5_10.5.19-0+deb11u2.dsc e7a939cf6f795fa91b5b711af8b075408f6f7321 229336 mariadb-10.5_10.5.19-0+deb11u2.debian.tar.xz 586524cab72311eb0d6cda9828c4a74caa6e3b94 9438 mariadb-10.5_10.5.19-0+deb11u2_source.buildinfo Checksums-Sha256: e6978639d40cf14d6861dc83484e89b1ae75deec420e1496385fc01e288e0824 4814 mariadb-10.5_10.5.19-0+deb11u2.dsc 0bdf0a48b466ad8f77f0c2618b7ac4a8a76b26f2dfe83f9820666e2b8b2b0335 229336 mariadb-10.5_10.5.19-0+deb11u2.debian.tar.xz d417be766e3739cab92ebd5905aa8450d4069b86b1ba7f4d567bd12fb91d2fe7 9438 mariadb-10.5_10.5.19-0+deb11u2_source.buildinfo Files: 8f47265e73ed91573b7c86dfda7e94b8 4814 database optional mariadb-10.5_10.5.19-0+deb11u2.dsc fde7fb8b03f36700bc3528f71b6fbd10 229336 database optional mariadb-10.5_10.5.19-0+deb11u2.debian.tar.xz e33e53ce991673c1469c783b51117b29 9438 database optional mariadb-10.5_10.5.19-0+deb11u2_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEmbRSsR88dMO0U+RvvthEn87o2ogFAmRCJcsACgkQvthEn87o 2oh7+A/9FQcUfPXimB+frgB56muzkhmchZd45KMOg/ia/6wK+rDtaAOBOwer3Btt SUb7fkCGZcii32eQnN4Bg832i7nUFX6ElquRgVHGAXgT35vDHKRVNWQBx1Ijt3jX Jpi53gWNpi5gy8/jf4VFxMV4Ohoqt6HIkxMb+x+CW6Oqk643BsIAthOqSWq9uHcv itCtalgM+wDvMzNkKPbvfK0iKn3PQEDvreWygXncljCr4vjSghhLa4ISkXSqm1JM q8f63DUKPRUmqFalGab+xitKnGJgJur089vxfbuvH1npwEJbN8+eZlR2HnTGZsnN G/izX0kyRBXaMN5Rg+BzPB2gLv9cdj399efbLhsU7VoFLxdLwJFmUQHD171fE5IC BPSfRJnSNPetvKxvF21FlK8/rxy5difiaU2ZRZgRum5fzLefUvr6zhutowTnl34F 1fqnNWMaq2Qt8zPO6iPAYG2e9v+IlSvdxXNeuTblguK/tWMGfwZtii0357BAhoTr FOiO/pPXhoBmgJ/Ia0uX6o0UT13Wuxzv7ZlnvfctVh0Bm4PsN9c9xw/ZHSCXixC2 s6EbWddsEQv2hjp3M+grd1fh6SC9EPOMMVLOOVB32cVU/f8cqMOlHS3Og/v+BiWR +zNxewzGM1Y5EQN+YaSHc7IgRNUlhGMGiZPH+VfRLphen7wQkss= =JNAm -----END PGP SIGNATURE----- From ftpmaster at ftp-master.debian.org Fri Apr 21 15:07:22 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 21 Apr 2023 14:07:22 +0000 Subject: [debian-mysql] mariadb-10.5_10.5.19-0+deb11u2_source.changes ACCEPTED into proposed-updates Message-ID: Thank you for your contribution to Debian. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 15 Apr 2023 12:50:35 -0700 Source: mariadb-10.5 Binary: libmariadb-dev libmariadb-dev-compat libmariadb3 libmariadbd19 libmariadbd-dev mariadb-common mariadb-client-core-10.5 mariadb-client-10.5 mariadb-server-core-10.5 mariadb-server-10.5 mariadb-server mariadb-client mariadb-backup mariadb-plugin-connect mariadb-plugin-s3 mariadb-plugin-rocksdb mariadb-plugin-oqgraph mariadb-plugin-mroonga mariadb-plugin-spider mariadb-plugin-gssapi-server mariadb-plugin-gssapi-client mariadb-plugin-cracklib-password-check mariadb-test mariadb-test-data Architecture: source Version: 1:10.5.19-0+deb11u2 Distribution: bullseye Urgency: medium Maintainer: Debian MySQL Maintainers Changed-By: Otto Kek?l?inen Description: libmariadb-dev - MariaDB database development files libmariadb-dev-compat - MariaDB Connector/C, compatibility symlinks libmariadb3 - MariaDB database client library libmariadbd-dev - MariaDB embedded database, development files libmariadbd19 - MariaDB embedded database, shared library mariadb-backup - Backup tool for MariaDB server mariadb-client - MariaDB database client (metapackage depending on the latest vers mariadb-client-10.5 - MariaDB database client binaries mariadb-client-core-10.5 - MariaDB database core client binaries mariadb-common - MariaDB common configuration files mariadb-plugin-connect - Connect storage engine for MariaDB mariadb-plugin-cracklib-password-check - CrackLib Password Validation Plugin for MariaDB mariadb-plugin-gssapi-client - GSSAPI authentication plugin for MariaDB client mariadb-plugin-gssapi-server - GSSAPI authentication plugin for MariaDB server mariadb-plugin-mroonga - Mroonga storage engine for MariaDB mariadb-plugin-oqgraph - OQGraph storage engine for MariaDB mariadb-plugin-rocksdb - RocksDB storage engine for MariaDB mariadb-plugin-s3 - Amazon S3 archival storage engine for MariaDB mariadb-plugin-spider - Spider storage engine for MariaDB mariadb-server - MariaDB database server (metapackage depending on the latest vers mariadb-server-10.5 - MariaDB database server binaries mariadb-server-core-10.5 - MariaDB database core server files mariadb-test - MariaDB database regression test suite mariadb-test-data - MariaDB database regression test suite - data files Closes: 1033654 Changes: mariadb-10.5 (1:10.5.19-0+deb11u2) bullseye; urgency=medium . * Add patch to revert upstream libmariadb API change (Closes: #1033654) Checksums-Sha1: fdeb56de65b4d4e4936a0fd70135d11a8c8d6102 4814 mariadb-10.5_10.5.19-0+deb11u2.dsc e7a939cf6f795fa91b5b711af8b075408f6f7321 229336 mariadb-10.5_10.5.19-0+deb11u2.debian.tar.xz 586524cab72311eb0d6cda9828c4a74caa6e3b94 9438 mariadb-10.5_10.5.19-0+deb11u2_source.buildinfo Checksums-Sha256: e6978639d40cf14d6861dc83484e89b1ae75deec420e1496385fc01e288e0824 4814 mariadb-10.5_10.5.19-0+deb11u2.dsc 0bdf0a48b466ad8f77f0c2618b7ac4a8a76b26f2dfe83f9820666e2b8b2b0335 229336 mariadb-10.5_10.5.19-0+deb11u2.debian.tar.xz d417be766e3739cab92ebd5905aa8450d4069b86b1ba7f4d567bd12fb91d2fe7 9438 mariadb-10.5_10.5.19-0+deb11u2_source.buildinfo Files: 8f47265e73ed91573b7c86dfda7e94b8 4814 database optional mariadb-10.5_10.5.19-0+deb11u2.dsc fde7fb8b03f36700bc3528f71b6fbd10 229336 database optional mariadb-10.5_10.5.19-0+deb11u2.debian.tar.xz e33e53ce991673c1469c783b51117b29 9438 database optional mariadb-10.5_10.5.19-0+deb11u2_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEmbRSsR88dMO0U+RvvthEn87o2ogFAmRCJcsACgkQvthEn87o 2oh7+A/9FQcUfPXimB+frgB56muzkhmchZd45KMOg/ia/6wK+rDtaAOBOwer3Btt SUb7fkCGZcii32eQnN4Bg832i7nUFX6ElquRgVHGAXgT35vDHKRVNWQBx1Ijt3jX Jpi53gWNpi5gy8/jf4VFxMV4Ohoqt6HIkxMb+x+CW6Oqk643BsIAthOqSWq9uHcv itCtalgM+wDvMzNkKPbvfK0iKn3PQEDvreWygXncljCr4vjSghhLa4ISkXSqm1JM q8f63DUKPRUmqFalGab+xitKnGJgJur089vxfbuvH1npwEJbN8+eZlR2HnTGZsnN G/izX0kyRBXaMN5Rg+BzPB2gLv9cdj399efbLhsU7VoFLxdLwJFmUQHD171fE5IC BPSfRJnSNPetvKxvF21FlK8/rxy5difiaU2ZRZgRum5fzLefUvr6zhutowTnl34F 1fqnNWMaq2Qt8zPO6iPAYG2e9v+IlSvdxXNeuTblguK/tWMGfwZtii0357BAhoTr FOiO/pPXhoBmgJ/Ia0uX6o0UT13Wuxzv7ZlnvfctVh0Bm4PsN9c9xw/ZHSCXixC2 s6EbWddsEQv2hjp3M+grd1fh6SC9EPOMMVLOOVB32cVU/f8cqMOlHS3Og/v+BiWR +zNxewzGM1Y5EQN+YaSHc7IgRNUlhGMGiZPH+VfRLphen7wQkss= =JNAm -----END PGP SIGNATURE----- From ftpmaster at ftp-master.debian.org Fri Apr 21 15:07:13 2023 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 21 Apr 2023 14:07:13 +0000 Subject: [debian-mysql] galera-3_25.3.37-0+deb11u1_source.changes ACCEPTED into proposed-updates Message-ID: Thank you for your contribution to Debian. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 15 Apr 2023 12:14:05 -0700 Source: galera-3 Binary: galera-3 galera-arbitrator-3 Architecture: source Version: 25.3.37-0+deb11u1 Distribution: bullseye Urgency: medium Maintainer: Debian MySQL Maintainers Changed-By: Otto Kek?l?inen Description: galera-3 - Replication framework for transactional applications galera-arbitrator-3 - Galera arbitrator daemon Changes: galera-3 (25.3.37-0+deb11u1) bullseye; urgency=medium . * New upstream version 25.3.37. Includes multiple bug fixes, see https://github.com/codership/documentation/blob/master/release-notes/release-notes-galera-25.3.37.txt - Arbitrator daemon garbd now has parameters -w, --workdir and WORK_DIR in garb.conf which can be used to set the working directory for garbd process, which helps to fix long standing issue from 2015 (https://github.com/codership/galera/issues/313). Checksums-Sha1: a5667a77dd7f039b9ed4811bd6db251a26ac0ff9 2408 galera-3_25.3.37-0+deb11u1.dsc e65fe0eeeda5cdd805fb9ebd180287f2c73fc658 1282455 galera-3_25.3.37.orig.tar.gz 3b75c6b5ef89bb4a7f8402aedfa676ea44760921 488 galera-3_25.3.37.orig.tar.gz.asc 9458444e9b1acede987a96776a1cff00790d6214 16372 galera-3_25.3.37-0+deb11u1.debian.tar.xz b2439dece7f3a94e66aa02018e32162a987d8554 8397 galera-3_25.3.37-0+deb11u1_source.buildinfo Checksums-Sha256: 15b98484bec535e15074fff9d292ca3192f966a67f2b4e902e37a005b2eb9850 2408 galera-3_25.3.37-0+deb11u1.dsc 8997e80dd8afbc9c335ebb00ad68dfe799a917e3144f6befb76678e8f1be8cda 1282455 galera-3_25.3.37.orig.tar.gz a5c4678297ec5d358aa2020bb215a9b2e89dc57c95e66c47c7cc796f634c5aa3 488 galera-3_25.3.37.orig.tar.gz.asc f0d24a9dfd4f982a04947e0be9ce041ba6cfad5cb960cee0bab1c635f065631f 16372 galera-3_25.3.37-0+deb11u1.debian.tar.xz 14bd4a543a9063b19e92b927ef7154090fa09ef9fce82e49ecd0c776b60af613 8397 galera-3_25.3.37-0+deb11u1_source.buildinfo Files: b2e089034f42083b7f852e8b856417b9 2408 database optional galera-3_25.3.37-0+deb11u1.dsc deed69f2302b8e606b82b3056fb83081 1282455 database optional galera-3_25.3.37.orig.tar.gz d5efe35ed3ac56eb5efbe4d6fe761463 488 database optional galera-3_25.3.37.orig.tar.gz.asc 031f87b3bc679490fd65fc539167d38d 16372 database optional galera-3_25.3.37-0+deb11u1.debian.tar.xz fb133656c9c6498a591b65a475bff23c 8397 database optional galera-3_25.3.37-0+deb11u1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEmbRSsR88dMO0U+RvvthEn87o2ogFAmRCGLYACgkQvthEn87o 2oh9Nw//fSONL+/gW526lhZKzgUYOsDoSv6YGDObkaJ7tCxghKfaP8tQR6jG3lKG PJziOXhXU39rHcvBzITNUsuo+WiX3EmYdqTd4oJFrNdA3vjHUMsVFMVzk/5ZZhPy kMwHF+xO4sBS/Qpmu3Ekh2NApGPfvtpvflNQuuaGVJ6JhobmeXRkyrPbkmWUAIaX jPZs45x0++FTaNqdAhhFj2HUjRomHCvk4FRKyGPy4yR3oCcKGMFpTnxirwiFmkqa xn5TBuFPokI/zjNAfyVUTzjWQQX6QiAsC9SvZ5W0JubZEd/yMn8mbyi3RuGKgIIE 1VJBrG+O5ltKhK48IPHh/qjEP34qr5FP5knhd2lhpPFLHA7q47Afn7e0i7yRB0jG vb3SgaCvGXJCQeotAsli5w9L0fNCItI4wck+QBMvMyYTljOKi5fcUthjnGFXs2rv ziD8ZAt8i5fIZqbFY7BEBBeOOYNMwDRVfkJzyD1OVMYb7YM3wU0+00ewpKgKWiDd LDd6nBDP1ygcA4F5c5mjSQPQ5iNyDCcMmMYpxOsGcWRoy6ceec6VNVF868559k4t DS7IIu9/Xu0MSMRmwn4k02suNl0icFMfhZlxDj6w3hUDXXg71XJwDj81DGP1mH6s DMFsm2qy8y6dJ1XQHtbSjNSr0fL+GGyM+NoPCgvR0ynydVY7gLU= =ItPT -----END PGP SIGNATURE----- From owner at bugs.debian.org Fri Apr 21 15:39:11 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Fri, 21 Apr 2023 14:39:11 +0000 Subject: [debian-mysql] Bug#1033654: marked as done (akonadi broken with libmariadb from s-p-u) References: <20230329124514.GB17892@kriegisch.at> Message-ID: Your message dated Fri, 21 Apr 2023 14:07:22 +0000 with message-id and subject line Bug#1033654: fixed in mariadb-10.5 1:10.5.19-0+deb11u2 has caused the Debian Bug report #1033654, regarding akonadi broken with libmariadb from s-p-u to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1033654: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033654 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Adi Kriegisch Subject: akonadi broken with libmariadb from s-p-u Date: Wed, 29 Mar 2023 14:45:14 +0200 Size: 4349 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#1033654: fixed in mariadb-10.5 1:10.5.19-0+deb11u2 Date: Fri, 21 Apr 2023 14:07:22 +0000 Size: 8675 URL: From gibmat at debian.org Fri Apr 21 16:58:24 2023 From: gibmat at debian.org (Mathias Gibbens) Date: Fri, 21 Apr 2023 15:58:24 +0000 Subject: [debian-mysql] Bug#1034684: mariadb-server: superfluous warnings in preinst Message-ID: <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> Package: mariadb-server Version: 1:10.11.2-3 Severity: normal In a clean sid environment, when installing mariadb-server two warnings are emitted from commands in the preinst script which should probably be suppressed: > Preparing to unpack .../00-mariadb-server_1%3a10.11.2-3_amd64.deb ... > id: ?mysql?: no such user > adduser: Warning: The home dir /nonexistent you specified can't be accessed: No such file or directory The offending commands are on lines 28 and 187 of d/mariadb- server.preinst. Mathias -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: This is a digitally signed message part URL: From otto at debian.org Fri Apr 21 18:58:33 2023 From: otto at debian.org (Otto =?UTF-8?Q?Kek=C3=A4l=C3=A4inen?=) Date: Fri, 21 Apr 2023 10:58:33 -0700 Subject: [debian-mysql] Bug#1034684: mariadb-server: superfluous warnings in preinst In-Reply-To: <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> References: <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> Message-ID: Thanks for reporting! This seems like a real bug if 'id' says user does not exist. What are the steps to reproduce this? -------------- next part -------------- An HTML attachment was scrubbed... URL: From xan at charbonnet.com Fri Apr 21 19:14:48 2023 From: xan at charbonnet.com (Xan Charbonnet) Date: Fri, 21 Apr 2023 13:14:48 -0500 Subject: [debian-mysql] Bug 1027337 - backport the fix to stable? Message-ID: <64f0efb0-0ad5-5366-d166-fe193931c003@charbonnet.com> Hello, mariadb-server-10.5 version 10.5.18, which was pushed out to stable back on December 4, contained a bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027337 which was fixed in Debian unstable on March 10th. This bug makes it impossible for me to upgrade my stable DNS servers from 10.5.15. Are there any plans for this updated version to make it to stable? Thank you for maintaining MariaDB in Debian! From gibmat at debian.org Fri Apr 21 23:07:57 2023 From: gibmat at debian.org (Mathias Gibbens) Date: Fri, 21 Apr 2023 22:07:57 +0000 Subject: [debian-mysql] Bug#1034684: mariadb-server: superfluous warnings in preinst In-Reply-To: References: <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> Message-ID: <9d482f1e2cd6ad4966fd8a99a8649746592e7364.camel@debian.org> On Fri, 2023-04-21 at 10:58 -0700, Otto Kek?l?inen wrote: > Thanks for reporting! > > This seems like a real bug if 'id' says user does not exist. On a fresh install, indeed, there won't be a "mysql" user (yet) when preinst is run. The check could be changed to something like `if id mysql >/dev/null 2>&1` to gobble up any output that's produced. I don't know if `adduser` needs the `--home` argument specified, as the argument right before is `--no-create-home`. > > What are the steps to reproduce this? I was in a fresh, minimal install of sid. Then I just ran an `apt install mariadb-server`. Mathias -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: This is a digitally signed message part URL: From otto at debian.org Sat Apr 22 00:37:58 2023 From: otto at debian.org (Otto =?UTF-8?Q?Kek=C3=A4l=C3=A4inen?=) Date: Fri, 21 Apr 2023 16:37:58 -0700 Subject: [debian-mysql] Bug#1034684: mariadb-server: superfluous warnings in preinst In-Reply-To: <9d482f1e2cd6ad4966fd8a99a8649746592e7364.camel@debian.org> References: <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> <9d482f1e2cd6ad4966fd8a99a8649746592e7364.camel@debian.org> <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> Message-ID: Hi! Ok, I see, your analysis seems correct. Do you want to take a stab at submitting a Merge Request to fix it? https://salsa.debian.org/mariadb-team/mariadb-server/-/wikis/Contributing-to-MariaDB-packaging-in-Debian From gibmat at debian.org Sat Apr 22 17:49:51 2023 From: gibmat at debian.org (Mathias Gibbens) Date: Sat, 22 Apr 2023 16:49:51 +0000 Subject: [debian-mysql] Bug#1034684: mariadb-server: superfluous warnings in preinst In-Reply-To: References: <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> <9d482f1e2cd6ad4966fd8a99a8649746592e7364.camel@debian.org> <8bbdb86483c171533385ec5af8ebde306b038979.camel@debian.org> Message-ID: <1e7fb664909b22e3bd8815289a32850e55ced699.camel@debian.org> On Fri, 2023-04-21 at 16:37 -0700, Otto Kek?l?inen wrote: > Hi! > > Ok, I see, your analysis seems correct. Do you want to take a stab at > submitting a Merge Request to fix it? Merge request is up: https://salsa.debian.org/mariadb-team/mariadb-server/-/merge_requests/44 Mathias -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: This is a digitally signed message part URL: From jmm at inutil.org Sat Apr 22 18:23:51 2023 From: jmm at inutil.org (Moritz =?UTF-8?Q?M=C3=BChlenhoff?=) Date: Sat, 22 Apr 2023 19:23:51 +0200 Subject: [debian-mysql] Bug#1034719: mysql-8.0: CVE-2023-21982 CVE-2023-21980 CVE-2023-21977 CVE-2023-21976 CVE-2023-21972 CVE-2023-21966 CVE-2023-21962 CVE-2023-21955 CVE-2023-21953 CVE-2023-21947 CVE-2023-21946 CVE-2023-21945 CVE-2023-21940 CVE-2023-21935 CVE-2023-21933 CVE-2023-21929 CVE-2023-21920 CVE-2023-21919 CVE-2023-21911 Message-ID: Source: mysql-8.0 X-Debbugs-CC: team at security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for mysql-8.0. CVE-2023-21982[0]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21980[1]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Client programs). Supported versions that are affected are 5.7.41 and | prior and 8.0.32 and prior. Difficult to exploit vulnerability allows | low privileged attacker with network access via multiple protocols to | compromise MySQL Server. Successful attacks require human interaction | from a person other than the attacker. Successful attacks of this | vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base | Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS | Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). CVE-2023-21977[2]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21976[3]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21972[4]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: DML). Supported versions that are affected are 8.0.32 and | prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21966[5]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: JSON). Supported versions that are affected are 8.0.32 and | prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21962[6]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Components Services). Supported versions that are affected are | 8.0.32 and prior. Easily exploitable vulnerability allows high | privileged attacker with network access via multiple protocols to | compromise MySQL Server. Successful attacks of this vulnerability can | result in unauthorized ability to cause a hang or frequently | repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score | 4.9 (Availability impacts). CVSS Vector: | (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21955[7]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Partition). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21953[8]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Partition). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21947[9]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Components Services). Supported versions that are affected are | 8.0.32 and prior. Difficult to exploit vulnerability allows high | privileged attacker with network access via multiple protocols to | compromise MySQL Server. Successful attacks of this vulnerability can | result in unauthorized ability to cause a hang or frequently | repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score | 4.4 (Availability impacts). CVSS Vector: | (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21946[10]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows low privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21945[11]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21940[12]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Components Services). Supported versions that are affected are | 8.0.32 and prior. Difficult to exploit vulnerability allows high | privileged attacker with network access via multiple protocols to | compromise MySQL Server. Successful attacks of this vulnerability can | result in unauthorized ability to cause a hang or frequently | repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score | 4.4 (Availability impacts). CVSS Vector: | (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21935[13]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21933[14]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: DDL). Supported versions that are affected are 8.0.32 and | prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21929[15]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: DDL). Supported versions that are affected are 8.0.32 and | prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server as well as unauthorized update, insert | or delete access to some of MySQL Server accessible data. CVSS 3.1 | Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: | (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). CVE-2023-21920[16]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are affected are 8.0.32 | and prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21919[17]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: DDL). Supported versions that are affected are 8.0.32 and | prior. Easily exploitable vulnerability allows high privileged | attacker with network access via multiple protocols to compromise | MySQL Server. Successful attacks of this vulnerability can result in | unauthorized ability to cause a hang or frequently repeatable crash | (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability | impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). CVE-2023-21911[18]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | InnoDB). Supported versions that are affected are 8.0.32 and prior. | Easily exploitable vulnerability allows high privileged attacker with | network access via multiple protocols to compromise MySQL Server. | Successful attacks of this vulnerability can result in unauthorized | ability to cause a hang or frequently repeatable crash (complete DOS) | of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS | Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-21982 https://www.cve.org/CVERecord?id=CVE-2023-21982 [1] https://security-tracker.debian.org/tracker/CVE-2023-21980 https://www.cve.org/CVERecord?id=CVE-2023-21980 [2] https://security-tracker.debian.org/tracker/CVE-2023-21977 https://www.cve.org/CVERecord?id=CVE-2023-21977 [3] https://security-tracker.debian.org/tracker/CVE-2023-21976 https://www.cve.org/CVERecord?id=CVE-2023-21976 [4] https://security-tracker.debian.org/tracker/CVE-2023-21972 https://www.cve.org/CVERecord?id=CVE-2023-21972 [5] https://security-tracker.debian.org/tracker/CVE-2023-21966 https://www.cve.org/CVERecord?id=CVE-2023-21966 [6] https://security-tracker.debian.org/tracker/CVE-2023-21962 https://www.cve.org/CVERecord?id=CVE-2023-21962 [7] https://security-tracker.debian.org/tracker/CVE-2023-21955 https://www.cve.org/CVERecord?id=CVE-2023-21955 [8] https://security-tracker.debian.org/tracker/CVE-2023-21953 https://www.cve.org/CVERecord?id=CVE-2023-21953 [9] https://security-tracker.debian.org/tracker/CVE-2023-21947 https://www.cve.org/CVERecord?id=CVE-2023-21947 [10] https://security-tracker.debian.org/tracker/CVE-2023-21946 https://www.cve.org/CVERecord?id=CVE-2023-21946 [11] https://security-tracker.debian.org/tracker/CVE-2023-21945 https://www.cve.org/CVERecord?id=CVE-2023-21945 [12] https://security-tracker.debian.org/tracker/CVE-2023-21940 https://www.cve.org/CVERecord?id=CVE-2023-21940 [13] https://security-tracker.debian.org/tracker/CVE-2023-21935 https://www.cve.org/CVERecord?id=CVE-2023-21935 [14] https://security-tracker.debian.org/tracker/CVE-2023-21933 https://www.cve.org/CVERecord?id=CVE-2023-21933 [15] https://security-tracker.debian.org/tracker/CVE-2023-21929 https://www.cve.org/CVERecord?id=CVE-2023-21929 [16] https://security-tracker.debian.org/tracker/CVE-2023-21920 https://www.cve.org/CVERecord?id=CVE-2023-21920 [17] https://security-tracker.debian.org/tracker/CVE-2023-21919 https://www.cve.org/CVERecord?id=CVE-2023-21919 [18] https://security-tracker.debian.org/tracker/CVE-2023-21911 https://www.cve.org/CVERecord?id=CVE-2023-21911 Please adjust the affected versions in the BTS as needed. From otto at debian.org Sat Apr 22 18:55:50 2023 From: otto at debian.org (Otto =?UTF-8?Q?Kek=C3=A4l=C3=A4inen?=) Date: Sat, 22 Apr 2023 10:55:50 -0700 Subject: [debian-mysql] Bug#1030510: Info received (mariadb: FTBFS on s390x: timeout) In-Reply-To: References: Message-ID: For the record: After upload of MariaDB 1:10.11.2-3 the MTR test suite failed to start (just timed out) after the build, potentially because the server binary was crashing/defect. On a third try it passed. 1: https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=s390x&ver=1%3A10.11.2-3&stamp=1682066999&raw=0 E: Build killed with signal TERM after 150 minutes of inactivity 2: https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=s390x&ver=1%3A10.11.2-3&stamp=1682102108&raw=0 E: Build killed with signal TERM after 150 minutes of inactivity 3: https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=s390x&ver=1%3A10.11.2-3&stamp=1682123620&raw=0 Completed: All 1028 tests were successful. All builds had: sbuild (Debian sbuild) 0.81.2+deb11u1 (31 August 2022) on zani.debian.org Kernel: Linux 5.10.0-21-s390x #1 SMP Debian 5.10.162-1 (2023-01-21) s390x (s390x) From otto at debian.org Sat Apr 22 19:00:07 2023 From: otto at debian.org (Otto =?UTF-8?Q?Kek=C3=A4l=C3=A4inen?=) Date: Sat, 22 Apr 2023 11:00:07 -0700 Subject: [debian-mysql] Bug#1006529: mariadb: FTBFS on hppa References: Message-ID: For the record: After upload of MariaDB 1:10.11.2-3 the build passed. MTR was skipped because of DEB_BUILD_OPTIONS: nocheck https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=hppa&ver=1%3A10.11.2-3&stamp=1682133330&raw=0 sbuild (Debian sbuild) 0.85.2 (11 March 2023) on mx3210 Kernel: Linux 6.1.24+ #1 SMP Sat Apr 15 15:43:47 UTC 2023 hppa (parisc64) Toolchain package versions: binutils_2.40-2 dpkg-dev_1.21.21 g++-12_12.2.0-14 gcc-12_12.2.0-14 libc6-dev_2.36-9 libstdc++-12-dev_12.2.0-14 libstdc++6_12.2.0-14 linux-libc-dev_6.1.20-2 From otto at debian.org Sat Apr 22 19:02:11 2023 From: otto at debian.org (Otto =?UTF-8?Q?Kek=C3=A4l=C3=A4inen?=) Date: Sat, 22 Apr 2023 11:02:11 -0700 Subject: [debian-mysql] Bug#1029374: mariadb: FTBFS on ppc64 References: Message-ID: For the record: After upload of MariaDB 1:10.11.2-3 the build passed and MTR completed with 1031 tests successfully. https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=ppc64&ver=1%3A10.11.2-3&stamp=1682058655&raw=0 sbuild (Debian sbuild) 0.85.2 (11 March 2023) on blaauw Kernel: Linux 6.1.0-5-powerpc64 #1 SMP Debian 6.1.12-1 (2023-02-15) ppc64 (ppc64) Toolchain package versions: binutils_2.40-2 dpkg-dev_1.21.21 g++-12_12.2.0-14 gcc-12_12.2.0-14 libc6-dev_2.36-9 libstdc++-12-dev_12.2.0-14 libstdc++6_12.2.0-14 linux-libc-dev_6.1.20-2 From owner at bugs.debian.org Sat Apr 22 19:21:02 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 22 Apr 2023 18:21:02 +0000 Subject: [debian-mysql] Bug#1007216: marked as done (mariadb-10.6: FTBFS on ppc64: unrecognized opcode tbegin/tabort/tend) References: Message-ID: Your message dated Sat, 22 Apr 2023 11:17:39 -0700 with message-id and subject line mariadb-10.6: FTBFS on ppc64: unrecognized opcode tbegin/tabort/tend has caused the Debian Bug report #1007216, regarding mariadb-10.6: FTBFS on ppc64: unrecognized opcode tbegin/tabort/tend to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1007216: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007216 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: =?UTF-8?B?T3R0byBLZWvDpGzDpGluZW4=?= Subject: mariadb-10.6: FTBFS on ppc64: unrecognized opcode tbegin/tabort/tend Date: Sun, 13 Mar 2022 12:36:45 -0700 Size: 4890 URL: -------------- next part -------------- An embedded message was scrubbed... From: =?UTF-8?B?T3R0byBLZWvDpGzDpGluZW4=?= Subject: mariadb-10.6: FTBFS on ppc64: unrecognized opcode tbegin/tabort/tend Date: Sat, 22 Apr 2023 11:17:39 -0700 Size: 3385 URL: From otto at debian.org Sat Apr 22 19:21:37 2023 From: otto at debian.org (Otto =?UTF-8?Q?Kek=C3=A4l=C3=A4inen?=) Date: Sat, 22 Apr 2023 11:21:37 -0700 Subject: [debian-mysql] Bug#1030630: mariadb: FTBFS on sparc64 References: Message-ID: Hi! After upload of MariaDB 1:10.11.2-3 the build has now different symptoms. Likewise to Bug#1029374 (ppc64) and Bug#1006529 (hppa) the errors about io_uring and somewhat random crashes are now gone. I do not know why. Comparison of latest build: https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=sparc64&ver=1%3A10.11.2-3&stamp=1682142981&raw=0 sbuild (Debian sbuild) 0.85.2 (11 March 2023) on nvg5120.east.ru Kernel: Linux 6.1.0-6-sparc64-smp #1 SMP Debian 6.1.15-1 (2023-03-05) sparc64 (sparc64) Toolchain package versions: binutils_2.40-2 dpkg-dev_1.21.21 g++-12_12.2.0-12 gcc-12_12.2.0-12 libc6-dev_2.36-4 libstdc++-12-dev_12.2.0-12 libstdc++6_12.2.0-12 linux-libc-dev_6.1.20-2 vs previous build in March: https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=sparc64&ver=1%3A10.11.2-2&stamp=1679832953&raw=0 sbuild (Debian sbuild) 0.85.2 (11 March 2023) on sompek.debian.net Kernel: Linux 6.1.0-7-sparc64-smp #1 SMP Debian 6.1.20-1 (2023-03-19) sparc64 (sparc64) Toolchain package versions: binutils_2.40-2 dpkg-dev_1.21.21 g++-12_12.2.0-12 gcc-12_12.2.0-12 libc6-dev_2.36-4 libstdc++-12-dev_12.2.0-12 libstdc++6_12.2.0-12 linux-libc-dev_6.1.20-1 In the latest build there are no crashes or timeouts. New/current failures are purely due to warnings from mariadb-upgrade, which will be investigated in another bug report. From owner at bugs.debian.org Sat Apr 22 20:03:09 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 22 Apr 2023 19:03:09 +0000 Subject: [debian-mysql] Processed: tagging 1034725, bug 1034725 is forwarded to https://github.com/merces/libpe/issues/35 ... References: <1682190073-3169-bts-carnil@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > tags 1034725 + upstream Bug #1034725 [src:pev] pev: CVE-2021-45423 Added tag(s) upstream. > forwarded 1034725 https://github.com/merces/libpe/issues/35 Bug #1034725 [src:pev] pev: CVE-2021-45423 Set Bug forwarded-to-address to 'https://github.com/merces/libpe/issues/35'. > found 1034725 0.81-8 Bug #1034725 [src:pev] pev: CVE-2021-45423 Marked as found in versions pev/0.81-8. > found 1034725 0.81-3 Bug #1034725 [src:pev] pev: CVE-2021-45423 Marked as found in versions pev/0.81-3. > tags 1034724 + upstream Bug #1034724 [src:libyang2] libyang2: CVE-2023-26917 Added tag(s) upstream. > found 1034724 2.1.30-2 Bug #1034724 [src:libyang2] libyang2: CVE-2023-26917 Marked as found in versions libyang2/2.1.30-2. > forwarded 1034724 https://github.com/CESNET/libyang/issues/1987 Bug #1034724 [src:libyang2] libyang2: CVE-2023-26917 Set Bug forwarded-to-address to 'https://github.com/CESNET/libyang/issues/1987'. > reassign 1034723 src:rust-h2 Bug #1034723 [src:rust-hyper] rust-hyper: CVE-2023-26964 Bug reassigned from package 'src:rust-hyper' to 'src:rust-h2'. Ignoring request to alter found versions of bug #1034723 to the same values previously set Ignoring request to alter fixed versions of bug #1034723 to the same values previously set > tags 1034723 + upstream Bug #1034723 [src:rust-h2] rust-hyper: CVE-2023-26964 Added tag(s) upstream. > forwarded 1034723 https://github.com/hyperium/hyper/issues/2877 Bug #1034723 [src:rust-h2] rust-hyper: CVE-2023-26964 Set Bug forwarded-to-address to 'https://github.com/hyperium/hyper/issues/2877'. > tags 1034722 + upstream Bug #1034722 [src:jpeg-xl] jpeg-xl: CVE-2023-0645 Added tag(s) upstream. > forwarded 1034722 https://github.com/libjxl/libjxl/issues/2100 Bug #1034722 [src:jpeg-xl] jpeg-xl: CVE-2023-0645 Set Bug forwarded-to-address to 'https://github.com/libjxl/libjxl/issues/2100'. > tags 1034721 + upstream Bug #1034721 [src:wireshark] wireshark: CVE-2023-1992 CVE-2023-1993 CVE-2023-1994 Added tag(s) upstream. > found 1034721 4.0.3-1 Bug #1034721 [src:wireshark] wireshark: CVE-2023-1992 CVE-2023-1993 CVE-2023-1994 Marked as found in versions wireshark/4.0.3-1. > tags 1034720 + upstream Bug #1034720 [src:openssl] openssl: CVE-2023-1255 CVE-2023-0466 CVE-2023-0465 CVE-2023-0464 Added tag(s) upstream. > found 1034720 3.0.8-1 Bug #1034720 [src:openssl] openssl: CVE-2023-1255 CVE-2023-0466 CVE-2023-0465 CVE-2023-0464 Marked as found in versions openssl/3.0.8-1. > tags 1034719 + upstream Bug #1034719 [src:mysql-8.0] mysql-8.0: CVE-2023-21982 CVE-2023-21980 CVE-2023-21977 CVE-2023-21976 CVE-2023-21972 CVE-2023-21966 CVE-2023-21962 CVE-2023-21955 CVE-2023-21953 CVE-2023-21947 CVE-2023-21946 CVE-2023-21945 CVE-2023-21940 CVE-2023-21935 CVE-2023-21933 CVE-2023-21929 CVE-2023-21920 CVE-2023-21919 CVE-2023-21911 Added tag(s) upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 1034719: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719 1034720: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034720 1034721: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721 1034722: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034722 1034723: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034723 1034724: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034724 1034725: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034725 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From xan at charbonnet.com Mon Apr 24 01:45:25 2023 From: xan at charbonnet.com (Xan Charbonnet) Date: Sun, 23 Apr 2023 19:45:25 -0500 Subject: [debian-mysql] Bug#1034770: mariadb-server-10.5: Fix for MDEV-29988 (part of 10.5.19) needs to be in stable Message-ID: <168229712564.155578.9412167422859962272.reportbug@www2.biblionix.com> Package: mariadb-server-10.5 Version: 1:10.5.18-0+deb11u1 Severity: important X-Debbugs-Cc: xan at charbonnet.com, team at security.debian.org Dear maintainer, The update in bullseye from 10.5.15 to 10.5.18 on December 4, 2022 contained a major performance problem for some workloads. It causes my DNS server running PowerDNS with a MariaDB backend to run out of memory. This was reported in Debian Bug 1027337: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027337 and fixed by putting 10.5.19 into unstable. However, I (and presumably others?) run stable for my DNS servers, and I'm still stuck on 10.5.15. If anything could be done I would appreciate it. Thanks. -- System Information: Debian Release: 11.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-21-amd64 (SMP w/2 CPU threads) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages mariadb-server-10.5 depends on: ii adduser 3.118 ii debconf [debconf-2.0] 1.5.77 ii galera-4 26.4.11-0+deb11u1 ii gawk 1:5.1.0-1 ii iproute2 5.10.0-4 ii libc6 2.31-13+deb11u5 ii libdbi-perl 1.643-3+b1 ii libpam0g 1.4.0-9+deb11u1 ii libssl1.1 1.1.1n-0+deb11u4 ii libstdc++6 10.2.1-6 ii lsb-base 11.1.0 ii lsof 4.93.2+dfsg-1.1 ii mariadb-client-10.5 1:10.5.18-0+deb11u1 ii mariadb-common 1:10.5.18-0+deb11u1 ii mariadb-server-core-10.5 1:10.5.18-0+deb11u1 ii passwd 1:4.8.1-1 ii perl 5.32.1-4+deb11u2 ii procps 2:3.3.17-5 ii psmisc 23.4-2 ii rsync 3.2.3-4+deb11u1 ii socat 1.7.4.1-3 ii zlib1g 1:1.2.11.dfsg-2+deb11u2 Versions of packages mariadb-server-10.5 recommends: ii libhtml-template-perl 2.97-1.1 Versions of packages mariadb-server-10.5 suggests: ii bsd-mailx [mailx] 8.1.2-0.20180807cvs-2 pn mariadb-test pn netcat-openbsd -- debconf-show failed From owner at bugs.debian.org Mon Apr 24 03:03:04 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Mon, 24 Apr 2023 02:03:04 +0000 Subject: [debian-mysql] Processed: your mail References: Message-ID: Processing commands for control at bugs.debian.org: > tags 1034770 bullseye Bug #1034770 [mariadb-server-10.5] mariadb-server-10.5: Fix for MDEV-29988 (part of 10.5.19) needs to be in stable Added tag(s) bullseye. > End of message, stopping processing here. Please contact me if you need assistance. -- 1034770: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034770 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From rossboylan at stanfordalumni.org Tue Apr 25 06:17:56 2023 From: rossboylan at stanfordalumni.org (Ross Boylan) Date: Mon, 24 Apr 2023 22:17:56 -0700 Subject: [debian-mysql] Thanks for fixing the versioning problem in maria 10.5 Message-ID: maria 1:10.5.19-0+deb11u1 significantly broke MythTV, at least v31 packaged at deb-multimedia. It wouldn't delete shows and had trouble saving other information. I spent significant time tracking this down. I cured the myth problems by downgrading maria back to 1:10.5.18-0+deb11u1, but was pleased to discover that you undid the 10.6 versioning scheme with 1:10.5.18-0+deb11u2, which also works fine. At least I think the changes are to the versioning scheme. Is there any direct way to see the changes between the 2 most recent stable releases? Your fix was motivated by a problem with akonadi (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033654) but the problems extended further. In case you're not aware, there are also bugs related to this for libqtsql (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031863). I guess qtsql will have to change to work with 10.6, but that's not an issue for stable. And myth v32 and v33 reportedly also have changes to deal with this. Myth uses maria and the QtSQL libraries. Many different theories for the cause of the problems in Myth are floating around; as far as I can tell there's no definitive diagnosis--e.g., why the version switch should matter, or how that relates to problems handling datetimestamps that end with Z. Thanks for tracking down and fixing this so quickly. Ross Boylan From otto at debian.org Tue Apr 25 08:05:25 2023 From: otto at debian.org (=?UTF-8?B?T3R0byBLZWvDpGzDpGluZW4=?=) Date: Tue, 25 Apr 2023 00:05:25 -0700 Subject: [debian-mysql] Thanks for fixing the versioning problem in maria 10.5 In-Reply-To: References: Message-ID: Hi! Thanks for reporting that issue is solved! You can do nd details in commit log at https://salsa.debian.org/mariadb-team/mariadb-10.5 and all the bug reports that are linked. If you want to help get this fixed upstream, please leave a well argumented comment on https://github.com/mariadb-corporation/mariadb-connector-c/pull/219 ma 24. huhtik. 2023 klo 22.18 Ross Boylan kirjoitti: > maria 1:10.5.19-0+deb11u1 significantly broke MythTV, at least v31 > packaged at deb-multimedia. It wouldn't delete shows and had trouble > saving other information. I spent significant time tracking this down. > > I cured the myth problems by downgrading maria back to > 1:10.5.18-0+deb11u1, but was pleased to discover that you undid the > 10.6 versioning scheme with 1:10.5.18-0+deb11u2, which also works > fine. > > At least I think the changes are to the versioning scheme. Is there > any direct way to see the changes between the 2 most recent stable > releases? > > Your fix was motivated by a problem with akonadi > (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033654) but the > problems extended further. > > In case you're not aware, there are also bugs related to this for > libqtsql (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031863). > I guess qtsql will have to change to work with 10.6, but that's not an > issue for stable. > > And myth v32 and v33 reportedly also have changes to deal with this. > Myth uses maria and the QtSQL libraries. > > Many different theories for the cause of the problems in Myth are > floating around; as far as I can tell there's no definitive > diagnosis--e.g., why the version switch should matter, or how that > relates to problems handling datetimestamps that end with Z. > > Thanks for tracking down and fixing this so quickly. > > Ross Boylan > -------------- next part -------------- An HTML attachment was scrubbed... URL: From owner at bugs.debian.org Tue Apr 25 19:54:07 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Tue, 25 Apr 2023 18:54:07 +0000 Subject: [debian-mysql] Processed: closing 1034770 References: <1682448678-2076-bts-carnil@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > close 1034770 1:10.5.19-0+deb11u1 Bug #1034770 [mariadb-server-10.5] mariadb-server-10.5: Fix for MDEV-29988 (part of 10.5.19) needs to be in stable Marked as fixed in versions mariadb-10.5/1:10.5.19-0+deb11u1. Bug #1034770 [mariadb-server-10.5] mariadb-server-10.5: Fix for MDEV-29988 (part of 10.5.19) needs to be in stable Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1034770: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034770 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From owner at bugs.debian.org Tue Apr 25 19:54:10 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Tue, 25 Apr 2023 18:54:10 +0000 Subject: [debian-mysql] Processed: unarchiving 1027337, forcibly merging 1027337 1034770 References: <1682448745-4032-bts-carnil@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > unarchive 1027337 Bug #1027337 {Done: Otto Kek?l?inen } [mariadb-server-10.5] mariadb-server-10.5: Huge increase in memory consumption (leak?) since upgrade from 10.5.15 to 10.5.18 Unarchived Bug 1027337 > forcemerge 1027337 1034770 Bug #1027337 {Done: Otto Kek?l?inen } [mariadb-server-10.5] mariadb-server-10.5: Huge increase in memory consumption (leak?) since upgrade from 10.5.15 to 10.5.18 Bug #1027337 {Done: Otto Kek?l?inen } [mariadb-server-10.5] mariadb-server-10.5: Huge increase in memory consumption (leak?) since upgrade from 10.5.15 to 10.5.18 Added tag(s) bullseye. Bug #1034770 {Done: Salvatore Bonaccorso } [mariadb-server-10.5] mariadb-server-10.5: Fix for MDEV-29988 (part of 10.5.19) needs to be in stable Merged 1027337 1034770 > thanks Stopping processing here. Please contact me if you need assistance. -- 1027337: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027337 1034770: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034770 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From martin.tldschina at chinadns.org.cn Wed Apr 26 10:49:36 2023 From: martin.tldschina at chinadns.org.cn (Martin Wang) Date: Wed, 26 Apr 2023 17:49:36 +0800 Subject: [debian-mysql] =?utf-8?q?Confirm=3A_Brand_name_and_keyword_regis?= =?utf-8?q?tration?= Message-ID: <2561053b-aa00-4ee9-9ce0-aeacc618eafc@alibaba.com> An HTML attachment was scrubbed... URL: From jmm at inutil.org Wed Apr 26 18:36:34 2023 From: jmm at inutil.org (Moritz =?UTF-8?Q?M=C3=BChlenhoff?=) Date: Wed, 26 Apr 2023 19:36:34 +0200 Subject: [debian-mysql] Bug#1034889: mariadb: CVE-2022-47015 Message-ID: Source: mariadb X-Debbugs-CC: team at security.debian.org Severity: normal Tags: security Hi, The following vulnerability was published for mariadb. CVE-2022-47015[0]: | MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of | Service. It is possible for function spider_db_mbase::print_warnings | to dereference a null pointer. https://jira.mariadb.org/browse/MDEV-29644, fixed in 10.11.3 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-47015 https://www.cve.org/CVERecord?id=CVE-2022-47015 Please adjust the affected versions in the BTS as needed. From otto at debian.org Wed Apr 26 19:28:07 2023 From: otto at debian.org (Otto =?UTF-8?Q?Kek=C3=A4l=C3=A4inen?=) Date: Wed, 26 Apr 2023 11:28:07 -0700 Subject: [debian-mysql] Bug#1034889: mariadb: CVE-2022-47015 In-Reply-To: References: Message-ID: This will be fixed as part of next upstream maintenance release update in all versions of Debian and Ubuntu. I expect to do it in coming 1-2 weeks. -------------- next part -------------- An HTML attachment was scrubbed... URL: From owner at bugs.debian.org Wed Apr 26 20:18:06 2023 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Wed, 26 Apr 2023 19:18:06 +0000 Subject: [debian-mysql] Processed: tagging 1034891, tagging 1034890, tagging 1034888, tagging 1034886, tagging 1034887, tagging 1034889 ... References: <1682536547-3618-bts-carnil@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > tags 1034891 + upstream Bug #1034891 [src:389-ds-base] 389-ds-base: CVE-2023-1055 Added tag(s) upstream. > tags 1034890 + upstream Bug #1034890 [src:gpac] gpac: CVE-2023-0841 Added tag(s) upstream. > tags 1034888 + upstream Bug #1034888 [src:ruby-commonmarker] ruby-commonmarker: CVE-2022-39209 Added tag(s) upstream. > tags 1034886 + upstream Bug #1034886 [src:docker.io] docker.io: CVE-2022-37708 Added tag(s) upstream. > tags 1034887 + upstream Bug #1034887 [src:python-cmarkgfm] python-cmarkgfm: CVE-2022-39209 Added tag(s) upstream. > tags 1034889 + upstream Bug #1034889 [src:mariadb] mariadb: CVE-2022-47015 Added tag(s) upstream. > forwarded 1034889 https://jira.mariadb.org/browse/MDEV-29644 Bug #1034889 [src:mariadb] mariadb: CVE-2022-47015 Set Bug forwarded-to-address to 'https://jira.mariadb.org/browse/MDEV-29644'. > found 1034889 1:10.11.2-1 Bug #1034889 [src:mariadb] mariadb: CVE-2022-47015 Marked as found in versions mariadb/1:10.11.2-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 1034886: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034886 1034887: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034887 1034888: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034888 1034889: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889 1034890: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034890 1034891: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034891 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From dominik.perkowski at socialglobal.pl Thu Apr 27 08:45:52 2023 From: dominik.perkowski at socialglobal.pl (Dominik Perkowski) Date: Thu, 27 Apr 2023 07:45:52 GMT Subject: [debian-mysql] Pozycjonowanie- informacja Message-ID: <20230427064500-0.1.5o.1n59d.0.j0za3se7x3@socialglobal.pl> Dzie? dobry, jaki? czas temu zg?osi?a si? do nas firma, kt?rej strona internetowa nie pozycjonowa?a si? wysoko w wyszukiwarce Google. Na podstawie wykonanego przez nas audytu SEO zoptymalizowali?my tre?ci na stronie pod k?tem wcze?niej opracowanych s??w kluczowych. Nasz wewn?trzny system codziennie analizuje prawid?owe dzia?anie witryny. Dzi?ki indywidualnej strategii, firma zdobywa coraz wi?cej Klient?w. Czy chcieliby Pa?stwo zwi?kszy? liczb? os?b odwiedzaj?cych stron? internetow? firmy? M?g?bym przedstawi? ofert?? Pozdrawiam serdecznie, Dominik Perkowski From jbrice at enaco.com.pe Sat Apr 29 14:37:58 2023 From: jbrice at enaco.com.pe (jbrice at enaco.com.pe) Date: Sat, 29 Apr 2023 15:37:58 +0200 Subject: [debian-mysql] (no subject) Message-ID: Dear , I am writing to you in confidence to propose a business partnership that I believe would be mutually beneficial for both of us. Due to the sensitive nature of the proposal, I am unable to provide further details in this email. However, I would like your response to discuss the opportunity further. I assure you that all discussions and information shared will be treated with the utmost confidentiality. I believe if we share a common vision we could achieve great success through this partnership. Please let me know if you are interested to discuss this proposal further, Kindly send me an email at: stefankaren406 at gmail.com Thank you for your time and consideration. Best regards, Karen Stefan -------------- next part -------------- An HTML attachment was scrubbed... URL: