← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1668934] Re: percona-xtradb-cluster-5.6 5.6.34-26.19, percona-galera-3 3.19, percona-xtrabackup 2.3.7

 

This bug was fixed in the package percona-xtradb-cluster-5.6 -
5.6.34-26.19-0ubuntu1

---------------
percona-xtradb-cluster-5.6 (5.6.34-26.19-0ubuntu1) zesty; urgency=medium

  * SECURITY UPDATE: Update to 5.6.34-26.19 to fix security issues
    (LP: #1668934):
    - CVE-2015-4766
    - CVE-2015-4792
    - CVE-2015-4800
    - CVE-2015-4802
    - CVE-2015-4815
    - CVE-2015-4819
    - CVE-2015-4826
    - CVE-2015-4830
    - CVE-2015-4833
    - CVE-2015-4836
    - CVE-2015-4858
    - CVE-2015-4861
    - CVE-2015-4862
    - CVE-2015-4864
    - CVE-2015-4866
    - CVE-2015-4870
    - CVE-2015-4879
    - CVE-2015-4890
    - CVE-2015-4895
    - CVE-2015-4904
    - CVE-2015-4905
    - CVE-2015-4910
    - CVE-2015-4913
    - CVE-2015-7744
    - CVE-2016-0503
    - CVE-2016-0504
    - CVE-2016-0505
    - CVE-2016-0546
    - CVE-2016-0594
    - CVE-2016-0595
    - CVE-2016-0596
    - CVE-2016-0597
    - CVE-2016-0598
    - CVE-2016-0600
    - CVE-2016-0605
    - CVE-2016-0606
    - CVE-2016-0607
    - CVE-2016-0608
    - CVE-2016-0609
    - CVE-2016-0610
    - CVE-2016-0611
    - CVE-2016-0616
    - CVE-2016-0640
    - CVE-2016-0641
    - CVE-2016-0642
    - CVE-2016-0643
    - CVE-2016-0644
    - CVE-2016-0646
    - CVE-2016-0647
    - CVE-2016-0648
    - CVE-2016-0649
    - CVE-2016-0650
    - CVE-2016-0655
    - CVE-2016-0661
    - CVE-2016-0665
    - CVE-2016-0666
    - CVE-2016-0668
    - CVE-2016-2047
    - CVE-2016-3452
    - CVE-2016-3459
    - CVE-2016-3471
    - CVE-2016-3477
    - CVE-2016-3486
    - CVE-2016-3492
    - CVE-2016-3501
    - CVE-2016-3521
    - CVE-2016-3614
    - CVE-2016-3615
    - CVE-2016-5439
    - CVE-2016-5440
    - CVE-2016-5444
    - CVE-2016-5507
    - CVE-2016-5584
    - CVE-2016-5609
    - CVE-2016-5612
    - CVE-2016-5626
    - CVE-2016-5627
    - CVE-2016-5629
    - CVE-2016-5630
    - CVE-2016-6662
    - CVE-2016-6663
    - CVE-2016-8283
    - CVE-2016-8284
    - CVE-2016-8288
  * Changes for new upstream version:
    - d/p/fix_mtr_ssl_cert.patch: Drop, included upstream.
    - d/rules,percona-xtradb-cluster-server-5.6.docs: Tweak install
      of tests and docs for new PXC version.
    - d/control: Bump minimum versions of percona-galera-3 and
      percona-xtrabackup.
    - d/rules: Add misc compiler flags to no-error nonnull-compare,
      unused-result and no-deprecated-declarations.
    - d/control: Add BD on dh-python.
    - d/percona-xtradb-cluster-server-5.6.preinst: Add creation of
      /var/lib/mysql-files as part of package install.
    - d/p/weak-memory-compat.patch: Re-enable builds for architectures
      with weak memory models (ppc64el, arm64, armhf, powerpc, s390x).
  * d/repack.sh: Switch tar file compression to bz2.
  * d/*: wrap-and-sort.
  * d/control,compat: Bump debhelper compat level to 9.

 -- James Page <james.page@xxxxxxxxxx>  Mon, 06 Mar 2017 09:41:46 +0000

** Changed in: percona-xtradb-cluster-5.6 (Ubuntu Zesty)
       Status: Triaged => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4766

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4792

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4800

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4802

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4815

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4819

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4826

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4830

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4833

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4836

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4858

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4861

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4862

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4864

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4866

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4870

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4879

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4890

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4895

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4904

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4905

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4910

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-4913

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7744

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0503

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0504

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0505

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0546

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0594

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0595

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0596

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0597

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0598

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0600

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0605

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0606

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0607

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0608

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0609

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0610

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0611

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0616

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0640

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0641

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0642

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0643

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0644

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0646

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0647

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0648

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0649

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0650

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0655

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0661

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0665

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0666

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0668

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-2047

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3452

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3459

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3471

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3477

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3486

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3492

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3501

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3521

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3614

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3615

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5439

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5440

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5444

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5507

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5584

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5609

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5612

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5626

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5627

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5629

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5630

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-6662

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-6663

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-8283

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-8284

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-8288

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1668934

Title:
  percona-xtradb-cluster-5.6 5.6.34-26.19, percona-galera-3 3.19,
  percona-xtrabackup 2.3.7

Status in percona-galera-3 package in Ubuntu:
  Fix Released
Status in percona-xtrabackup package in Ubuntu:
  Fix Released
Status in percona-xtradb-cluster-5.6 package in Ubuntu:
  Fix Released
Status in percona-galera-3 source package in Xenial:
  Triaged
Status in percona-xtrabackup source package in Xenial:
  Triaged
Status in percona-xtradb-cluster-5.6 source package in Xenial:
  Triaged
Status in percona-galera-3 source package in Yakkety:
  Triaged
Status in percona-xtrabackup source package in Yakkety:
  Triaged
Status in percona-xtradb-cluster-5.6 source package in Yakkety:
  Triaged
Status in percona-galera-3 source package in Zesty:
  Fix Released
Status in percona-xtrabackup source package in Zesty:
  Fix Released
Status in percona-xtradb-cluster-5.6 source package in Zesty:
  Fix Released

Bug description:
  [Impact]
  The version of percona-xtradb-cluster-5.6 in xenial and later is out of date with know security vulnerabilities; users of this package are a risk of compromise.

  [Test Case]
  To verify the upgrade to the newer versions is OK, deployment of a three unit pxc cluster with sample date, upgrade to new version and re-verification of data will be undertaken.

  [Regression Potential]
  Medium; we're re-aligning across all three packages with Percona's upstream repositories however this will require a version dependency bump in percona-xtrabackup (2.2.x -> 2.3.x); this should be fine, but this tool has potential use outside of percona-xtradb-server-5.6 (its great for online backups of MySQL generally).

  The test plan covers its use in PXC; however I would propose an
  extended bake period in -proposed with a call for testing on the
  ubuntu-server list prior to release to -updates.

  [Original Bug Report]
  The version of pxc in Ubuntu is really quite old with a number of security vulnerabilities; we should rebase onto the latest 5.6 release from PXC upstream.

  https://www.percona.com/doc/percona-xtradb-cluster/5.6/release-notes
  /release-notes_index.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/percona-galera-3/+bug/1668934/+subscriptions