View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/mysql-5.6
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/pristine-tar 2018-03-07 17:56:47 UTC 2018-03-07
pristine-tar data for mysql-5.6_5.6.33.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-03-07 17:56:47 UTC

pristine-tar data for mysql-5.6_5.6.33.orig.tar.gz

importer/ubuntu/dsc 2018-03-07 17:48:37 UTC 2018-03-07
DSC file for 5.6.33-0ubuntu0.14.04.1

Author: Ubuntu Git Importer
Author Date: 2018-03-07 17:48:37 UTC

DSC file for 5.6.33-0ubuntu0.14.04.1

importer/debian/pristine-tar 2018-03-07 15:51:22 UTC 2018-03-07
pristine-tar data for mysql-5.6_5.6.35.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-03-07 15:51:22 UTC

pristine-tar data for mysql-5.6_5.6.35.orig.tar.gz

importer/debian/dsc 2018-03-07 15:44:12 UTC 2018-03-07
DSC file for 5.6.35-1

Author: Ubuntu Git Importer
Author Date: 2018-03-07 15:44:12 UTC

DSC file for 5.6.35-1

applied/debian/sid 2017-01-20 22:19:57 UTC 2017-01-20
Import patches-applied version 5.6.35-1 to applied/debian/sid

Author: Lars Tangvald
Author Date: 2017-01-17 11:41:15 UTC

Import patches-applied version 5.6.35-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: b6637a291da0591bda4a774fee60773cb993c306
Unapplied parent: b8c72dbb4392efdb5945d8233bf7e1caf13764d5

New changelog entries:
  [ Andreas Beckmann ]
  * Stop building the unversioned metapackages, these are now built from
    src:mysql-5.7.
  * mysql-server-core-5.6: Add Breaks+Replaces: mysql-server-5.5 for the moved
    innochecksum manpage. (Closes: #847992, #848118)
  [ Lars Tangvald ]
  * Imported upstream version 5.6.35 to fix security issues:
    - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
    - CVE-2016-8318 CVE-2016-8327 CVE-2017-3238 CVE-2017-3244
    - CVE-2017-3257 CVE-2017-3258 CVE-2017-3265 CVE-2017-3273
    - CVE-2017-3291 CVE-2017-3312 CVE-2017-3313 CVE-2017-3317
    - CVE-2017-3318
    (Closes: #851234)
  * Fix failing test main.events_2
    The test was failing after 2017-01-01 because of a hardcoded date in the test
    Added workaround patch, pending upstream fix.
  * Fix ftbfs with newer libedit versions
    The new version had an api change, causing the cmake check to fail.
    (Closes: #851156)

debian/sid 2017-01-20 22:19:57 UTC 2017-01-20
Import patches-unapplied version 5.6.35-1 to debian/sid

Author: Lars Tangvald
Author Date: 2017-01-17 11:41:15 UTC

Import patches-unapplied version 5.6.35-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: aabfeb40094755372d4c51eeef63b79eef1edfab

New changelog entries:
  [ Andreas Beckmann ]
  * Stop building the unversioned metapackages, these are now built from
    src:mysql-5.7.
  * mysql-server-core-5.6: Add Breaks+Replaces: mysql-server-5.5 for the moved
    innochecksum manpage. (Closes: #847992, #848118)
  [ Lars Tangvald ]
  * Imported upstream version 5.6.35 to fix security issues:
    - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
    - CVE-2016-8318 CVE-2016-8327 CVE-2017-3238 CVE-2017-3244
    - CVE-2017-3257 CVE-2017-3258 CVE-2017-3265 CVE-2017-3273
    - CVE-2017-3291 CVE-2017-3312 CVE-2017-3313 CVE-2017-3317
    - CVE-2017-3318
    (Closes: #851234)
  * Fix failing test main.events_2
    The test was failing after 2017-01-01 because of a hardcoded date in the test
    Added workaround patch, pending upstream fix.
  * Fix ftbfs with newer libedit versions
    The new version had an api change, causing the cmake check to fail.
    (Closes: #851156)

ubuntu/trusty-updates 2016-09-20 12:09:35 UTC 2016-09-20
Import patches-unapplied version 5.6.33-0ubuntu0.14.04.1 to ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2016-09-19 12:37:23 UTC

Import patches-unapplied version 5.6.33-0ubuntu0.14.04.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e8156d9fc93b2ab60fd95800324c9b4402379b30

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.33 to fix security issues
    - CVE-2016-6662
  * debian/rules: new version no longer ships unit.pl.
  * debian/control: added libjson-perl to Build-Depends.

applied/ubuntu/trusty-devel 2016-09-20 12:09:35 UTC 2016-09-20
Import patches-applied version 5.6.33-0ubuntu0.14.04.1 to applied/ubuntu/trus...

Author: Marc Deslauriers
Author Date: 2016-09-19 12:37:23 UTC

Import patches-applied version 5.6.33-0ubuntu0.14.04.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 4bf54bcae6495b128fe43185b04601459e120c8c
Unapplied parent: f7746c959ec2161f6f72eb9b1af36308189b40a4

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.33 to fix security issues
    - CVE-2016-6662
  * debian/rules: new version no longer ships unit.pl.
  * debian/control: added libjson-perl to Build-Depends.

applied/ubuntu/trusty-security 2016-09-20 12:09:35 UTC 2016-09-20
Import patches-applied version 5.6.33-0ubuntu0.14.04.1 to applied/ubuntu/trus...

Author: Marc Deslauriers
Author Date: 2016-09-19 12:37:23 UTC

Import patches-applied version 5.6.33-0ubuntu0.14.04.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 4bf54bcae6495b128fe43185b04601459e120c8c
Unapplied parent: f7746c959ec2161f6f72eb9b1af36308189b40a4

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.33 to fix security issues
    - CVE-2016-6662
  * debian/rules: new version no longer ships unit.pl.
  * debian/control: added libjson-perl to Build-Depends.

applied/ubuntu/trusty-updates 2016-09-20 12:09:35 UTC 2016-09-20
Import patches-applied version 5.6.33-0ubuntu0.14.04.1 to applied/ubuntu/trus...

Author: Marc Deslauriers
Author Date: 2016-09-19 12:37:23 UTC

Import patches-applied version 5.6.33-0ubuntu0.14.04.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 4bf54bcae6495b128fe43185b04601459e120c8c
Unapplied parent: f7746c959ec2161f6f72eb9b1af36308189b40a4

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.33 to fix security issues
    - CVE-2016-6662
  * debian/rules: new version no longer ships unit.pl.
  * debian/control: added libjson-perl to Build-Depends.

ubuntu/trusty-security 2016-09-20 12:09:35 UTC 2016-09-20
Import patches-unapplied version 5.6.33-0ubuntu0.14.04.1 to ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2016-09-19 12:37:23 UTC

Import patches-unapplied version 5.6.33-0ubuntu0.14.04.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e8156d9fc93b2ab60fd95800324c9b4402379b30

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.33 to fix security issues
    - CVE-2016-6662
  * debian/rules: new version no longer ships unit.pl.
  * debian/control: added libjson-perl to Build-Depends.

ubuntu/trusty-devel 2016-09-20 12:09:35 UTC 2016-09-20
Import patches-unapplied version 5.6.33-0ubuntu0.14.04.1 to ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2016-09-19 12:37:23 UTC

Import patches-unapplied version 5.6.33-0ubuntu0.14.04.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e8156d9fc93b2ab60fd95800324c9b4402379b30

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.33 to fix security issues
    - CVE-2016-6662
  * debian/rules: new version no longer ships unit.pl.
  * debian/control: added libjson-perl to Build-Depends.

applied/ubuntu/wily-updates 2016-07-21 17:04:09 UTC 2016-07-21
Import patches-applied version 5.6.31-0ubuntu0.15.10.1 to applied/ubuntu/wily...

Author: Marc Deslauriers
Author Date: 2016-07-20 12:57:10 UTC

Import patches-applied version 5.6.31-0ubuntu0.15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: bb384d5aee3ef2b76a30d29224ca85134a810e81
Unapplied parent: 2acb04118d1b9dc1a9632c3466981b5410adaedc

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.31 to fix security issues (LP: #1604796)
    - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
    - CVE-2016-3459
    - CVE-2016-3477
    - CVE-2016-3486
    - CVE-2016-3501
    - CVE-2016-3521
    - CVE-2016-3614
    - CVE-2016-3615
    - CVE-2016-5439
    - CVE-2016-5440
  * debian/patches/fix-man-page-links.patch: removed, upstream.

ubuntu/wily-devel 2016-07-21 17:04:09 UTC 2016-07-21
Import patches-unapplied version 5.6.31-0ubuntu0.15.10.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-07-20 12:57:10 UTC

Import patches-unapplied version 5.6.31-0ubuntu0.15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63cfae9e22cefff8f8c08dbd6c7207d8ca71092a

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.31 to fix security issues (LP: #1604796)
    - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
    - CVE-2016-3459
    - CVE-2016-3477
    - CVE-2016-3486
    - CVE-2016-3501
    - CVE-2016-3521
    - CVE-2016-3614
    - CVE-2016-3615
    - CVE-2016-5439
    - CVE-2016-5440
  * debian/patches/fix-man-page-links.patch: removed, upstream.

ubuntu/wily-security 2016-07-21 17:04:09 UTC 2016-07-21
Import patches-unapplied version 5.6.31-0ubuntu0.15.10.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-07-20 12:57:10 UTC

Import patches-unapplied version 5.6.31-0ubuntu0.15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63cfae9e22cefff8f8c08dbd6c7207d8ca71092a

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.31 to fix security issues (LP: #1604796)
    - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
    - CVE-2016-3459
    - CVE-2016-3477
    - CVE-2016-3486
    - CVE-2016-3501
    - CVE-2016-3521
    - CVE-2016-3614
    - CVE-2016-3615
    - CVE-2016-5439
    - CVE-2016-5440
  * debian/patches/fix-man-page-links.patch: removed, upstream.

ubuntu/wily-updates 2016-07-21 17:04:09 UTC 2016-07-21
Import patches-unapplied version 5.6.31-0ubuntu0.15.10.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-07-20 12:57:10 UTC

Import patches-unapplied version 5.6.31-0ubuntu0.15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63cfae9e22cefff8f8c08dbd6c7207d8ca71092a

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.31 to fix security issues (LP: #1604796)
    - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
    - CVE-2016-3459
    - CVE-2016-3477
    - CVE-2016-3486
    - CVE-2016-3501
    - CVE-2016-3521
    - CVE-2016-3614
    - CVE-2016-3615
    - CVE-2016-5439
    - CVE-2016-5440
  * debian/patches/fix-man-page-links.patch: removed, upstream.

applied/ubuntu/wily-security 2016-07-21 17:04:09 UTC 2016-07-21
Import patches-applied version 5.6.31-0ubuntu0.15.10.1 to applied/ubuntu/wily...

Author: Marc Deslauriers
Author Date: 2016-07-20 12:57:10 UTC

Import patches-applied version 5.6.31-0ubuntu0.15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: bb384d5aee3ef2b76a30d29224ca85134a810e81
Unapplied parent: 2acb04118d1b9dc1a9632c3466981b5410adaedc

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.31 to fix security issues (LP: #1604796)
    - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
    - CVE-2016-3459
    - CVE-2016-3477
    - CVE-2016-3486
    - CVE-2016-3501
    - CVE-2016-3521
    - CVE-2016-3614
    - CVE-2016-3615
    - CVE-2016-5439
    - CVE-2016-5440
  * debian/patches/fix-man-page-links.patch: removed, upstream.

applied/ubuntu/wily-devel 2016-07-21 17:04:09 UTC 2016-07-21
Import patches-applied version 5.6.31-0ubuntu0.15.10.1 to applied/ubuntu/wily...

Author: Marc Deslauriers
Author Date: 2016-07-20 12:57:10 UTC

Import patches-applied version 5.6.31-0ubuntu0.15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: bb384d5aee3ef2b76a30d29224ca85134a810e81
Unapplied parent: 2acb04118d1b9dc1a9632c3466981b5410adaedc

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.31 to fix security issues (LP: #1604796)
    - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
    - CVE-2016-3459
    - CVE-2016-3477
    - CVE-2016-3486
    - CVE-2016-3501
    - CVE-2016-3521
    - CVE-2016-3614
    - CVE-2016-3615
    - CVE-2016-5439
    - CVE-2016-5440
  * debian/patches/fix-man-page-links.patch: removed, upstream.

applied/debian/stretch 2016-04-20 22:19:24 UTC 2016-04-20
Import patches-applied version 5.6.30-1 to applied/debian/sid

Author: Robie Basak
Author Date: 2016-04-20 15:22:57 UTC

Import patches-applied version 5.6.30-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: d5d7231727e81d3a5fc3a272aed2858c594c55e4
Unapplied parent: 7c25078fa25d1bb114831fd473488fc900a0a348

New changelog entries:
  * New upstream release for security fixes (Closes: #821094).
  * Drop d/libmysqlclient18.lintian-overrides as the problem is genuine
    and should not be hidden. This addresses #812812 in part, but does
    not close it.

debian/stretch 2016-04-20 22:19:24 UTC 2016-04-20
Import patches-unapplied version 5.6.30-1 to debian/sid

Author: Robie Basak
Author Date: 2016-04-20 15:22:57 UTC

Import patches-unapplied version 5.6.30-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9e5760d52d50ace5022c0c901b400af73064bd03

New changelog entries:
  * New upstream release for security fixes (Closes: #821094).
  * Drop d/libmysqlclient18.lintian-overrides as the problem is genuine
    and should not be hidden. This addresses #812812 in part, but does
    not close it.

ubuntu/xenial-proposed 2016-03-11 14:30:35 UTC 2016-03-11
Import patches-unapplied version 5.6.28-1ubuntu3 to ubuntu/xenial-proposed

Author: Robie Basak
Author Date: 2016-03-11 12:58:23 UTC

Import patches-unapplied version 5.6.28-1ubuntu3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 9e35d362a77ff21a62567a9c7b4fd76e9938ec76

New changelog entries:
  * Depend on apprmor (>= 2.10). When upgrading from Trusty, this is required
    to prevent a mysqld failure due to the new Unix domain socket support in
    newer AppArmor.
  * Bump upstart script respawn time limit. In some failure cases such as the
    apparmor one above, MySQL aborts without starting but takes more than five
    seconds, so upstart never detects failure. This causes "invoke-rc.d mysql
    start" to hang, including during postinst.

applied/ubuntu/devel 2016-03-11 14:30:35 UTC 2016-03-11
Import patches-applied version 5.6.28-1ubuntu3 to applied/ubuntu/xenial-proposed

Author: Robie Basak
Author Date: 2016-03-11 12:58:23 UTC

Import patches-applied version 5.6.28-1ubuntu3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 5acb798f29f82c809980ba686cb8a855a804b617
Unapplied parent: 788392262b46445e02b3e7cedd571ef650aa2b49

New changelog entries:
  * Depend on apprmor (>= 2.10). When upgrading from Trusty, this is required
    to prevent a mysqld failure due to the new Unix domain socket support in
    newer AppArmor.
  * Bump upstart script respawn time limit. In some failure cases such as the
    apparmor one above, MySQL aborts without starting but takes more than five
    seconds, so upstart never detects failure. This causes "invoke-rc.d mysql
    start" to hang, including during postinst.

applied/ubuntu/xenial 2016-03-11 14:30:35 UTC 2016-03-11
Import patches-applied version 5.6.28-1ubuntu3 to applied/ubuntu/xenial-proposed

Author: Robie Basak
Author Date: 2016-03-11 12:58:23 UTC

Import patches-applied version 5.6.28-1ubuntu3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 5acb798f29f82c809980ba686cb8a855a804b617
Unapplied parent: 788392262b46445e02b3e7cedd571ef650aa2b49

New changelog entries:
  * Depend on apprmor (>= 2.10). When upgrading from Trusty, this is required
    to prevent a mysqld failure due to the new Unix domain socket support in
    newer AppArmor.
  * Bump upstart script respawn time limit. In some failure cases such as the
    apparmor one above, MySQL aborts without starting but takes more than five
    seconds, so upstart never detects failure. This causes "invoke-rc.d mysql
    start" to hang, including during postinst.

applied/ubuntu/xenial-devel 2016-03-11 14:30:35 UTC 2016-03-11
Import patches-applied version 5.6.28-1ubuntu3 to applied/ubuntu/xenial-proposed

Author: Robie Basak
Author Date: 2016-03-11 12:58:23 UTC

Import patches-applied version 5.6.28-1ubuntu3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 5acb798f29f82c809980ba686cb8a855a804b617
Unapplied parent: 788392262b46445e02b3e7cedd571ef650aa2b49

New changelog entries:
  * Depend on apprmor (>= 2.10). When upgrading from Trusty, this is required
    to prevent a mysqld failure due to the new Unix domain socket support in
    newer AppArmor.
  * Bump upstart script respawn time limit. In some failure cases such as the
    apparmor one above, MySQL aborts without starting but takes more than five
    seconds, so upstart never detects failure. This causes "invoke-rc.d mysql
    start" to hang, including during postinst.

applied/ubuntu/xenial-proposed 2016-03-11 14:30:35 UTC 2016-03-11
Import patches-applied version 5.6.28-1ubuntu3 to applied/ubuntu/xenial-proposed

Author: Robie Basak
Author Date: 2016-03-11 12:58:23 UTC

Import patches-applied version 5.6.28-1ubuntu3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 5acb798f29f82c809980ba686cb8a855a804b617
Unapplied parent: 788392262b46445e02b3e7cedd571ef650aa2b49

New changelog entries:
  * Depend on apprmor (>= 2.10). When upgrading from Trusty, this is required
    to prevent a mysqld failure due to the new Unix domain socket support in
    newer AppArmor.
  * Bump upstart script respawn time limit. In some failure cases such as the
    apparmor one above, MySQL aborts without starting but takes more than five
    seconds, so upstart never detects failure. This causes "invoke-rc.d mysql
    start" to hang, including during postinst.

ubuntu/devel 2016-03-11 14:30:35 UTC 2016-03-11
Import patches-unapplied version 5.6.28-1ubuntu3 to ubuntu/xenial-proposed

Author: Robie Basak
Author Date: 2016-03-11 12:58:23 UTC

Import patches-unapplied version 5.6.28-1ubuntu3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 9e35d362a77ff21a62567a9c7b4fd76e9938ec76

New changelog entries:
  * Depend on apprmor (>= 2.10). When upgrading from Trusty, this is required
    to prevent a mysqld failure due to the new Unix domain socket support in
    newer AppArmor.
  * Bump upstart script respawn time limit. In some failure cases such as the
    apparmor one above, MySQL aborts without starting but takes more than five
    seconds, so upstart never detects failure. This causes "invoke-rc.d mysql
    start" to hang, including during postinst.

ubuntu/xenial 2016-03-11 14:30:35 UTC 2016-03-11
Import patches-unapplied version 5.6.28-1ubuntu3 to ubuntu/xenial-proposed

Author: Robie Basak
Author Date: 2016-03-11 12:58:23 UTC

Import patches-unapplied version 5.6.28-1ubuntu3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 9e35d362a77ff21a62567a9c7b4fd76e9938ec76

New changelog entries:
  * Depend on apprmor (>= 2.10). When upgrading from Trusty, this is required
    to prevent a mysqld failure due to the new Unix domain socket support in
    newer AppArmor.
  * Bump upstart script respawn time limit. In some failure cases such as the
    apparmor one above, MySQL aborts without starting but takes more than five
    seconds, so upstart never detects failure. This causes "invoke-rc.d mysql
    start" to hang, including during postinst.

ubuntu/xenial-devel 2016-03-11 14:30:35 UTC 2016-03-11
Import patches-unapplied version 5.6.28-1ubuntu3 to ubuntu/xenial-proposed

Author: Robie Basak
Author Date: 2016-03-11 12:58:23 UTC

Import patches-unapplied version 5.6.28-1ubuntu3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 9e35d362a77ff21a62567a9c7b4fd76e9938ec76

New changelog entries:
  * Depend on apprmor (>= 2.10). When upgrading from Trusty, this is required
    to prevent a mysqld failure due to the new Unix domain socket support in
    newer AppArmor.
  * Bump upstart script respawn time limit. In some failure cases such as the
    apparmor one above, MySQL aborts without starting but takes more than five
    seconds, so upstart never detects failure. This causes "invoke-rc.d mysql
    start" to hang, including during postinst.

ubuntu/vivid-security 2016-01-26 14:09:15 UTC 2016-01-26
Import patches-unapplied version 5.6.28-0ubuntu0.15.04.1 to ubuntu/vivid-secu...

Author: Marc Deslauriers
Author Date: 2016-01-25 13:09:15 UTC

Import patches-unapplied version 5.6.28-0ubuntu0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a7ccb81e0c716c8ca77febfbf1407b18c7c2c732

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.27 to fix security issues (LP: #1537750)
    - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
    - CVE-2016-0503
    - CVE-2016-0504
    - CVE-2016-0505
    - CVE-2016-0546
    - CVE-2016-0595
    - CVE-2016-0596
    - CVE-2016-0597
    - CVE-2016-0598
    - CVE-2016-0600
    - CVE-2016-0606
    - CVE-2016-0607
    - CVE-2016-0608
    - CVE-2016-0609
    - CVE-2016-0610
    - CVE-2016-0611
  * debian/patches/fix_testsuite_date.patch: removed, upstream.

ubuntu/vivid-devel 2016-01-26 14:09:15 UTC 2016-01-26
Import patches-unapplied version 5.6.28-0ubuntu0.15.04.1 to ubuntu/vivid-secu...

Author: Marc Deslauriers
Author Date: 2016-01-25 13:09:15 UTC

Import patches-unapplied version 5.6.28-0ubuntu0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a7ccb81e0c716c8ca77febfbf1407b18c7c2c732

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.27 to fix security issues (LP: #1537750)
    - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
    - CVE-2016-0503
    - CVE-2016-0504
    - CVE-2016-0505
    - CVE-2016-0546
    - CVE-2016-0595
    - CVE-2016-0596
    - CVE-2016-0597
    - CVE-2016-0598
    - CVE-2016-0600
    - CVE-2016-0606
    - CVE-2016-0607
    - CVE-2016-0608
    - CVE-2016-0609
    - CVE-2016-0610
    - CVE-2016-0611
  * debian/patches/fix_testsuite_date.patch: removed, upstream.

applied/ubuntu/vivid-updates 2016-01-26 14:09:15 UTC 2016-01-26
Import patches-applied version 5.6.28-0ubuntu0.15.04.1 to applied/ubuntu/vivi...

Author: Marc Deslauriers
Author Date: 2016-01-25 13:09:15 UTC

Import patches-applied version 5.6.28-0ubuntu0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 61bc2647a3be06bc707ba73d32aa3172ea396de2
Unapplied parent: 2107fddc05873e889a33546da123617f4e899d6b

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.27 to fix security issues (LP: #1537750)
    - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
    - CVE-2016-0503
    - CVE-2016-0504
    - CVE-2016-0505
    - CVE-2016-0546
    - CVE-2016-0595
    - CVE-2016-0596
    - CVE-2016-0597
    - CVE-2016-0598
    - CVE-2016-0600
    - CVE-2016-0606
    - CVE-2016-0607
    - CVE-2016-0608
    - CVE-2016-0609
    - CVE-2016-0610
    - CVE-2016-0611
  * debian/patches/fix_testsuite_date.patch: removed, upstream.

applied/ubuntu/vivid-devel 2016-01-26 14:09:15 UTC 2016-01-26
Import patches-applied version 5.6.28-0ubuntu0.15.04.1 to applied/ubuntu/vivi...

Author: Marc Deslauriers
Author Date: 2016-01-25 13:09:15 UTC

Import patches-applied version 5.6.28-0ubuntu0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 61bc2647a3be06bc707ba73d32aa3172ea396de2
Unapplied parent: 2107fddc05873e889a33546da123617f4e899d6b

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.27 to fix security issues (LP: #1537750)
    - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
    - CVE-2016-0503
    - CVE-2016-0504
    - CVE-2016-0505
    - CVE-2016-0546
    - CVE-2016-0595
    - CVE-2016-0596
    - CVE-2016-0597
    - CVE-2016-0598
    - CVE-2016-0600
    - CVE-2016-0606
    - CVE-2016-0607
    - CVE-2016-0608
    - CVE-2016-0609
    - CVE-2016-0610
    - CVE-2016-0611
  * debian/patches/fix_testsuite_date.patch: removed, upstream.

applied/ubuntu/vivid-security 2016-01-26 14:09:15 UTC 2016-01-26
Import patches-applied version 5.6.28-0ubuntu0.15.04.1 to applied/ubuntu/vivi...

Author: Marc Deslauriers
Author Date: 2016-01-25 13:09:15 UTC

Import patches-applied version 5.6.28-0ubuntu0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 61bc2647a3be06bc707ba73d32aa3172ea396de2
Unapplied parent: 2107fddc05873e889a33546da123617f4e899d6b

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.27 to fix security issues (LP: #1537750)
    - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
    - CVE-2016-0503
    - CVE-2016-0504
    - CVE-2016-0505
    - CVE-2016-0546
    - CVE-2016-0595
    - CVE-2016-0596
    - CVE-2016-0597
    - CVE-2016-0598
    - CVE-2016-0600
    - CVE-2016-0606
    - CVE-2016-0607
    - CVE-2016-0608
    - CVE-2016-0609
    - CVE-2016-0610
    - CVE-2016-0611
  * debian/patches/fix_testsuite_date.patch: removed, upstream.

ubuntu/vivid-updates 2016-01-26 14:09:15 UTC 2016-01-26
Import patches-unapplied version 5.6.28-0ubuntu0.15.04.1 to ubuntu/vivid-secu...

Author: Marc Deslauriers
Author Date: 2016-01-25 13:09:15 UTC

Import patches-unapplied version 5.6.28-0ubuntu0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a7ccb81e0c716c8ca77febfbf1407b18c7c2c732

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.27 to fix security issues (LP: #1537750)
    - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
    - CVE-2016-0503
    - CVE-2016-0504
    - CVE-2016-0505
    - CVE-2016-0546
    - CVE-2016-0595
    - CVE-2016-0596
    - CVE-2016-0597
    - CVE-2016-0598
    - CVE-2016-0600
    - CVE-2016-0606
    - CVE-2016-0607
    - CVE-2016-0608
    - CVE-2016-0609
    - CVE-2016-0610
    - CVE-2016-0611
  * debian/patches/fix_testsuite_date.patch: removed, upstream.

ubuntu/trusty-proposed 2015-07-28 20:53:17 UTC 2015-07-28
Import patches-unapplied version 5.6.19-0ubuntu0.14.04.4 to ubuntu/trusty-pro...

Author: dann frazier
Author Date: 2015-07-22 03:08:21 UTC

Import patches-unapplied version 5.6.19-0ubuntu0.14.04.4 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: b242207eafbeeb2f5cf9ac33a065d8dfd5cd0428

New changelog entries:
  * d/tests/upstream: Add main.ctype_uca to skip-test list as it requires
    writable /usr.
  * arm64_ftbfs_workaround.patch: work around gcc optimisation bug
    (LP: #1353729) to fix arm64 FTBFS.

applied/ubuntu/trusty-proposed 2015-07-28 20:53:17 UTC 2015-07-28
Import patches-applied version 5.6.19-0ubuntu0.14.04.4 to applied/ubuntu/trus...

Author: dann frazier
Author Date: 2015-07-22 03:08:21 UTC

Import patches-applied version 5.6.19-0ubuntu0.14.04.4 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 9e2031da0ce228b90fe745a60f4e0210eb12e98a
Unapplied parent: c39bbbc56acb605122248216041dd761ab291d32

New changelog entries:
  * d/tests/upstream: Add main.ctype_uca to skip-test list as it requires
    writable /usr.
  * arm64_ftbfs_workaround.patch: work around gcc optimisation bug
    (LP: #1353729) to fix arm64 FTBFS.

applied/ubuntu/wily 2015-07-21 14:43:16 UTC 2015-07-21
Import patches-applied version 5.6.25-0ubuntu1 to applied/ubuntu/wily-proposed

Author: Marc Deslauriers
Author Date: 2015-07-21 11:09:29 UTC

Import patches-applied version 5.6.25-0ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 9ac068a714463b7f8087ee4847be8998359dea1a
Unapplied parent: ed49ae85d7697cd0286b09b56d20d816c9559ae1

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.25 to fix security issues (LP: #1475294)
    - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
    - CVE-2015-2582
    - CVE-2015-2611
    - CVE-2015-2617
    - CVE-2015-2620
    - CVE-2015-2639
    - CVE-2015-2641
    - CVE-2015-2643
    - CVE-2015-2648
    - CVE-2015-2661
    - CVE-2015-4737
    - CVE-2015-4752
    - CVE-2015-4757
    - CVE-2015-4761
    - CVE-2015-4767
    - CVE-2015-4769
    - CVE-2015-4771
    - CVE-2015-4772

ubuntu/wily 2015-07-21 14:43:16 UTC 2015-07-21
Import patches-unapplied version 5.6.25-0ubuntu1 to ubuntu/wily-proposed

Author: Marc Deslauriers
Author Date: 2015-07-21 11:09:29 UTC

Import patches-unapplied version 5.6.25-0ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: b33ebbed684c621ec8dc56c9b2180414e2f34594

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.25 to fix security issues (LP: #1475294)
    - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
    - CVE-2015-2582
    - CVE-2015-2611
    - CVE-2015-2617
    - CVE-2015-2620
    - CVE-2015-2639
    - CVE-2015-2641
    - CVE-2015-2643
    - CVE-2015-2648
    - CVE-2015-2661
    - CVE-2015-4737
    - CVE-2015-4752
    - CVE-2015-4757
    - CVE-2015-4761
    - CVE-2015-4767
    - CVE-2015-4769
    - CVE-2015-4771
    - CVE-2015-4772

ubuntu/wily-proposed 2015-07-21 14:43:16 UTC 2015-07-21
Import patches-unapplied version 5.6.25-0ubuntu1 to ubuntu/wily-proposed

Author: Marc Deslauriers
Author Date: 2015-07-21 11:09:29 UTC

Import patches-unapplied version 5.6.25-0ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: b33ebbed684c621ec8dc56c9b2180414e2f34594

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.25 to fix security issues (LP: #1475294)
    - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
    - CVE-2015-2582
    - CVE-2015-2611
    - CVE-2015-2617
    - CVE-2015-2620
    - CVE-2015-2639
    - CVE-2015-2641
    - CVE-2015-2643
    - CVE-2015-2648
    - CVE-2015-2661
    - CVE-2015-4737
    - CVE-2015-4752
    - CVE-2015-4757
    - CVE-2015-4761
    - CVE-2015-4767
    - CVE-2015-4769
    - CVE-2015-4771
    - CVE-2015-4772

applied/ubuntu/wily-proposed 2015-07-21 14:43:16 UTC 2015-07-21
Import patches-applied version 5.6.25-0ubuntu1 to applied/ubuntu/wily-proposed

Author: Marc Deslauriers
Author Date: 2015-07-21 11:09:29 UTC

Import patches-applied version 5.6.25-0ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 9ac068a714463b7f8087ee4847be8998359dea1a
Unapplied parent: ed49ae85d7697cd0286b09b56d20d816c9559ae1

New changelog entries:
  * SECURITY UPDATE: Update to 5.6.25 to fix security issues (LP: #1475294)
    - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
    - CVE-2015-2582
    - CVE-2015-2611
    - CVE-2015-2617
    - CVE-2015-2620
    - CVE-2015-2639
    - CVE-2015-2641
    - CVE-2015-2643
    - CVE-2015-2648
    - CVE-2015-2661
    - CVE-2015-4737
    - CVE-2015-4752
    - CVE-2015-4757
    - CVE-2015-4761
    - CVE-2015-4767
    - CVE-2015-4769
    - CVE-2015-4771
    - CVE-2015-4772

ubuntu/utopic-proposed 2015-07-02 18:13:17 UTC 2015-07-02
Import patches-unapplied version 5.6.19-1~exp1ubuntu2.1 to ubuntu/utopic-prop...

Author: dann frazier
Author Date: 2015-06-11 21:01:19 UTC

Import patches-unapplied version 5.6.19-1~exp1ubuntu2.1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: 2d9250c2783d30b4a16de729296c1662ab2a5dc0

New changelog entries:
  * Introduce full memory barrier support for arm64 and ppc64el to fix
    corruption/hang issues (LP: #1427406).

applied/ubuntu/utopic-proposed 2015-07-02 18:13:17 UTC 2015-07-02
Import patches-applied version 5.6.19-1~exp1ubuntu2.1 to applied/ubuntu/utopi...

Author: dann frazier
Author Date: 2015-06-11 21:01:19 UTC

Import patches-applied version 5.6.19-1~exp1ubuntu2.1 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: adc2e84edd45772574bdabec3831366eceb0c857
Unapplied parent: b3ec81bbbeeb1f514ca86db62705403011d56c3e

New changelog entries:
  * Introduce full memory barrier support for arm64 and ppc64el to fix
    corruption/hang issues (LP: #1427406).

ubuntu/vivid-proposed 2015-07-02 18:13:17 UTC 2015-07-02
Import patches-unapplied version 5.6.24-0ubuntu2.1 to ubuntu/vivid-proposed

Author: dann frazier
Author Date: 2015-06-11 18:16:55 UTC

Import patches-unapplied version 5.6.24-0ubuntu2.1 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 8361ec0f20f236088284f386d393a3eebb1959c4

New changelog entries:
  * d/p/MDEV-{6450,6483,7026,7658}-*: Introduce full memory barrier support
    for arm64 and ppc64el to fix corruption/hang issues (LP: #1427406).

applied/ubuntu/vivid-proposed 2015-07-02 18:13:17 UTC 2015-07-02
Import patches-applied version 5.6.24-0ubuntu2.1 to applied/ubuntu/vivid-prop...

Author: dann frazier
Author Date: 2015-06-11 18:16:55 UTC

Import patches-applied version 5.6.24-0ubuntu2.1 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 34bdc2962b38cf394c0eb1deec5684ee75cc986a
Unapplied parent: a94d856b670328f8c478db931090ff751b6e09ab

New changelog entries:
  * d/p/MDEV-{6450,6483,7026,7658}-*: Introduce full memory barrier support
    for arm64 and ppc64el to fix corruption/hang issues (LP: #1427406).

applied/ubuntu/utopic-devel 2015-07-02 18:13:17 UTC 2015-07-02
Import patches-applied version 5.6.19-1~exp1ubuntu2.1 to applied/ubuntu/utopi...

Author: dann frazier
Author Date: 2015-06-11 21:01:19 UTC

Import patches-applied version 5.6.19-1~exp1ubuntu2.1 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: adc2e84edd45772574bdabec3831366eceb0c857
Unapplied parent: b3ec81bbbeeb1f514ca86db62705403011d56c3e

New changelog entries:
  * Introduce full memory barrier support for arm64 and ppc64el to fix
    corruption/hang issues (LP: #1427406).

ubuntu/utopic-devel 2015-07-02 18:13:17 UTC 2015-07-02
Import patches-unapplied version 5.6.19-1~exp1ubuntu2.1 to ubuntu/utopic-prop...

Author: dann frazier
Author Date: 2015-06-11 21:01:19 UTC

Import patches-unapplied version 5.6.19-1~exp1ubuntu2.1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: 2d9250c2783d30b4a16de729296c1662ab2a5dc0

New changelog entries:
  * Introduce full memory barrier support for arm64 and ppc64el to fix
    corruption/hang issues (LP: #1427406).

applied/ubuntu/vivid 2015-04-20 16:10:43 UTC 2015-04-20
Import patches-applied version 5.6.24-0ubuntu2 to applied/ubuntu/vivid-proposed

Author: Robie Basak
Author Date: 2015-04-20 15:37:09 UTC

Import patches-applied version 5.6.24-0ubuntu2 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 941d11c39f27b0020ae714654738b7291399ad12
Unapplied parent: 266af151fd7a430e7781189053392802b086d936

New changelog entries:
  * Rename and move apport hook to d/additions/source_mysql-5.6.py: now
    renaming is not needed so we can use dh_install.
  * d/{rules,mysql-server-5.6.install}: install apport hook correctly.
  * d/additions/source_mysql-5.6.py: attach new configuration files and
  * directories.

ubuntu/vivid 2015-04-20 16:10:43 UTC 2015-04-20
Import patches-unapplied version 5.6.24-0ubuntu2 to ubuntu/vivid-proposed

Author: Robie Basak
Author Date: 2015-04-20 15:37:09 UTC

Import patches-unapplied version 5.6.24-0ubuntu2 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: fa332bc20ff3a7d2214c90da7bb1dbb7ee1023e3

New changelog entries:
  * Rename and move apport hook to d/additions/source_mysql-5.6.py: now
    renaming is not needed so we can use dh_install.
  * d/{rules,mysql-server-5.6.install}: install apport hook correctly.
  * d/additions/source_mysql-5.6.py: attach new configuration files and
  * directories.

applied/ubuntu/utopic 2014-09-19 00:23:28 UTC 2014-09-19
Import patches-applied version 5.6.19-1~exp1ubuntu2 to applied/ubuntu/utopic-...

Author: Matthias Klose
Author Date: 2014-09-19 00:11:21 UTC

Import patches-applied version 5.6.19-1~exp1ubuntu2 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: ac4c1a10b59f3ff0283d92e2a705b1d085d3934f
Unapplied parent: 24ad4dd0936a63fdc49092ebadd879e94a175004

New changelog entries:
  * Revert the arm64 workaround.

ubuntu/utopic 2014-09-19 00:23:28 UTC 2014-09-19
Import patches-unapplied version 5.6.19-1~exp1ubuntu2 to ubuntu/utopic-proposed

Author: Matthias Klose
Author Date: 2014-09-19 00:11:21 UTC

Import patches-unapplied version 5.6.19-1~exp1ubuntu2 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: fd0aa98cd8674e22c7d13321d2918e5358469686

New changelog entries:
  * Revert the arm64 workaround.

debian/experimental 2014-07-21 22:10:14 UTC 2014-07-21
Import patches-unapplied version 5.6.19-1~exp1 to debian/experimental

Author: James Page
Author Date: 2014-07-21 13:01:12 UTC

Import patches-unapplied version 5.6.19-1~exp1 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: f389b3a3847ae0d4b3c2e681ace74ba3f59697e7

New changelog entries:
  [ Bjoern Boschman ]
  * SECURITY UPDATE: New upstream release (LP: #1330168).
    - www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
    - CVE-2014-2484
    - CVE-2014-4258
    - CVE-2014-4260
    - CVE-2014-4238
    - CVE-2014-4233
    - CVE-2014-4240
    - CVE-2014-4214

applied/debian/experimental 2014-07-21 22:10:14 UTC 2014-07-21
Import patches-applied version 5.6.19-1~exp1 to applied/debian/experimental

Author: James Page
Author Date: 2014-07-21 13:01:12 UTC

Import patches-applied version 5.6.19-1~exp1 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 84c9e4f91562375181b9910952154aca981c027d
Unapplied parent: f3548725b39ffc942d9c1167484ad124d28455f7

New changelog entries:
  [ Bjoern Boschman ]
  * SECURITY UPDATE: New upstream release (LP: #1330168).
    - www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
    - CVE-2014-2484
    - CVE-2014-4258
    - CVE-2014-4260
    - CVE-2014-4238
    - CVE-2014-4233
    - CVE-2014-4240
    - CVE-2014-4214

applied/ubuntu/trusty 2014-03-17 16:11:00 UTC 2014-03-17
Import patches-applied version 5.6.16-1~exp1 to applied/debian/experimental

Author: James Page
Author Date: 2014-03-17 08:56:24 UTC

Import patches-applied version 5.6.16-1~exp1 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 9b87f392cdf0f2079e067ec23bb20ca3da7d44ca
Unapplied parent: 2f5b805fd32d28b0ac8d01248afd6675071335c8

New changelog entries:
  * New upstream point release:
    - d/p/*: Refreshed.
  * d/rules: Don't run dh_install with --fail-missing and exclusions until
    package is a complete replacement for mysql-5.5.
  * d/p/CVE-2014-0001.patch:
    - Fix buffer overflow in client/mysql.cc via a long server version string.
      CVE-2014-0001 (Closes: #741590).
  * d/mysql-server-5.6.mysql.upstart: Add upstart configuration.
  * d/tests/*,control: Add autopkgtest from mysql-5.5:
    - disable binlog.binlog_server_start_options as it requires writable /usr.
    - disable build autopkgtest until package ships libmysqlclient18.
  * d/rules,mysql-server-5.6.install,apparmor-profile: Fixup install of
    apparmor profile.

ubuntu/trusty 2014-03-17 16:11:00 UTC 2014-03-17
Import patches-unapplied version 5.6.16-1~exp1 to debian/experimental

Author: James Page
Author Date: 2014-03-17 08:56:24 UTC

Import patches-unapplied version 5.6.16-1~exp1 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 9106c568e70e8467cc9f0907c51da594572a7ca8

New changelog entries:
  * New upstream point release:
    - d/p/*: Refreshed.
  * d/rules: Don't run dh_install with --fail-missing and exclusions until
    package is a complete replacement for mysql-5.5.
  * d/p/CVE-2014-0001.patch:
    - Fix buffer overflow in client/mysql.cc via a long server version string.
      CVE-2014-0001 (Closes: #741590).
  * d/mysql-server-5.6.mysql.upstart: Add upstart configuration.
  * d/tests/*,control: Add autopkgtest from mysql-5.5:
    - disable binlog.binlog_server_start_options as it requires writable /usr.
    - disable build autopkgtest until package ships libmysqlclient18.
  * d/rules,mysql-server-5.6.install,apparmor-profile: Fixup install of
    apparmor profile.

154 of 54 results

Other repositories

Name Last Modified
lp:ubuntu/+source/mysql-5.6 2020-05-26
11 of 1 result
You can't create new repositories for mysql-5.6 in Ubuntu.