Your message dated Wed, 28 Nov 2012 14:39:51 -0800 with message-id <[email protected]> and subject line This was closed by the update to 5.1.63 has caused the Debian Bug report #682212, regarding CVE-2012-0540 CVE-2012-1734 CVE-2012-1689 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 682212: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682212 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: mysql-5.1 Severity: grave Tags: security http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html : CVE-2012-0540 MySQL Server MySQL Protocol GIS Extension No 4.0 Network Low Single None None Partial+ 5.1.62 and earlier, 5.5.23 and earlier CVE-2012-1734 MySQL Server MySQL Protocol Server Optimizer No 4.0 Network Low Single None None Partial+ 5.1.62 and earlier, 5.5.23 and earlier CVE-2012-1689 MySQL Server MySQL Protocol Server Optimizer No 4.0 Network Low Single None None Partial+ 5.1.62 and earlier, 5.5.22 and earlier Cheers, Moritz
--- End Message ---
--- Begin Message ---mysql-5.1 (5.1.63-0+squeeze1) stable-security; urgency=high * SECURITY UPDATE: Unspecified vulnerabilities identified by Oracle: CVE-2012-0583 CVE-2012-1688 CVE-2012-1690 CVE-2012-1703. (Closes: 670636) * SECURITY UPDATE: New upstream version fixes authentication bypass. CVE-2012-2122 (Closes: #677018) * d/rules: Change get-orig-source to a working mirror. * Source also properly downloaded/repacked with get-orig-source to remove non DFSG compliant Docs files. -- Clint Byrum <[email protected]> Tue, 12 Jun 2012 06:12:57 -0700
--- End Message ---

