[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Installed mysql 3.22.30-4 (all source i386)



Installed:
mysql-doc_3.22.30-4_all.deb
  to dists/potato/non-free/binary-all/doc/mysql-doc_3.22.30-4.deb
  replacing mysql-doc_3.22.30-3.deb
mysql-doc_3.22.30-4_all.deb
  to dists/woody/non-free/binary-all/doc/mysql-doc_3.22.30-4.deb
  replacing mysql-doc_3.22.30-3.deb
mysql-client_3.22.30-4_i386.deb
  to dists/potato/non-free/binary-i386/misc/mysql-client_3.22.30-4.deb
  replacing mysql-client_3.22.30-3.deb
mysql-client_3.22.30-4_i386.deb
  to dists/woody/non-free/binary-i386/misc/mysql-client_3.22.30-4.deb
  replacing mysql-client_3.22.30-3.deb
mysql-server_3.22.30-4_i386.deb
  to dists/potato/non-free/binary-i386/misc/mysql-server_3.22.30-4.deb
  replacing mysql-server_3.22.30-3.deb
mysql-server_3.22.30-4_i386.deb
  to dists/woody/non-free/binary-i386/misc/mysql-server_3.22.30-4.deb
  replacing mysql-server_3.22.30-3.deb
mysql_3.22.30-4.diff.gz
  to dists/potato/non-free/source/misc/mysql_3.22.30-4.diff.gz
  replacing mysql_3.22.30-3.diff.gz
mysql_3.22.30-4.diff.gz
  to dists/woody/non-free/source/misc/mysql_3.22.30-4.diff.gz
  replacing mysql_3.22.30-3.diff.gz
mysql_3.22.30-4.dsc
  to dists/potato/non-free/source/misc/mysql_3.22.30-4.dsc
  replacing mysql_3.22.30-3.dsc
mysql_3.22.30-4.dsc
  to dists/woody/non-free/source/misc/mysql_3.22.30-4.dsc
  replacing mysql_3.22.30-3.dsc


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.6
Date: Wed,  9 Feb 2000 12:44:04 +0100
Source: mysql
Binary: mysql-doc mysql-client mysql-server
Architecture: source i386 all
Version: 3.22.30-4
Distribution: frozen unstable
Urgency: high
Maintainer: Christian Hammers <ch@debian.org>
Description: 
 mysql-client - mysql database client binaries
 mysql-doc  - mysql database documentation
 mysql-server - mysql database server binaries
Changes: 
 mysql (3.22.30-4) frozen unstable; urgency=high
 .
   * !!! SECURITY PATCH !!!
     According to Bugtraq there is a security flaw in mysql that allowes
     everybody who knows a valid account on a server and who has a host
     that is allowed to connect to bruteforce the password of this user
     in maximal 32 tries.
     I applied the short patch that was suggested to sql/password.c!
Files: 
 6257046b1a6f9f918601f0a76a5379bd 596 non-free/misc optional mysql_3.22.30-4.dsc
 26434e517c87a61a706f33c343a3c23b 77495 non-free/misc optional mysql_3.22.30-4.diff.gz
 a076e12fcc4b211d045cbb8b53cce422 1632004 non-free/misc optional mysql-doc_3.22.30-4_all.deb
 141cfc397fbf7b036af583d3e5e4e6f3 586298 non-free/misc optional mysql-server_3.22.30-4_i386.deb
 c4084783edad5c7892e5878bc292df05 86884 non-free/misc optional mysql-client_3.22.30-4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjihZPwACgkQkR9K5oahGOaZvQCgxDwK7lme+7KqXTaeeBxkuvnO
T7MAoNkQW+rP7ns1VK1VPlx/GAWUuou+
=pIiO
-----END PGP SIGNATURE-----


Reply to: