Skip to content
GitLab
Menu
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
Samuel Thibault
mariadb-10.1
Commits
0c028e81
Commit
0c028e81
authored
Dec 28, 2017
by
Otto Kekäläinen
Browse files
Update changelog for 10.1.30-0+deb9u1 release
parent
ccf02946
Changes
1
Hide whitespace changes
Inline
Side-by-side
debian/changelog
View file @
0c028e81
mariadb
-
10.1
(
10.1.29
-
0
+
deb9u1
)
stretch
;
urgency
=
medium
mariadb
-
10.1
(
10.1.30
-
0
+
deb9u1
)
stretch
-
security
;
urgency
=
high
[
Otto
Kek
ä
l
ä
inen
]
*
Revert
"Update d/gbp.conf to track stretch branches"
*
New
upstream
version
10.1.30
.
Includes
fixes
for
the
following
security
vulnerabilities
(
Closes
:
#
885345
):
-
CVE
-
2017
-
15365
*
Amend
previous
Debian
changelog
entries
to
contain
new
CVE
identifiers
*
Refresh
patches
for
MariaDB
10.1.30
[
Ond
ř
ej
Sur
ý
]
*
New
upstream
version
10.1.29
*
New
upstream
version
10.1.29
.
Includes
fixes
for
the
following
security
vulnerabilities
:
-
CVE
-
2017
-
10378
-
CVE
-
2017
-
10268
-
MDEV
-
13819
*
Add
libconfig
-
inifiles
-
perl
to
mariadb
-
client
-
10.1
depends
to
fix
mytop
*
Add
mips64el
to
the
list
of
platforms
that
are
allowed
to
fail
test
...
...
@@ -15,12 +27,15 @@ mariadb-10.1 (10.1.29-0+deb9u1) stretch; urgency=medium
[
Christian
Ehrhardt
]
*
d
/
t
/
upstream
:
skip
func_regexp_pcre
on
s390x
--
O
nd
ř
ej
Sur
ý
<
ondrej
@
debian
.
org
>
Fri
,
0
8
Dec
2017
19
:
40
:
38
+
0
0
00
--
O
tto
Kek
ä
l
ä
inen
<
otto
@
debian
.
org
>
Thu
,
2
8
Dec
2017
23
:
27
:
25
+
0
2
00
mariadb
-
10.1
(
10.1.26
-
0
+
deb9u1
)
stretch
-
security
;
urgency
=
high
*
New
upstream
version
10.1.26
.
Includes
fixes
for
the
following
security
vulnerabilities
:
-
CVE
-
2017
-
10384
-
CVE
-
2017
-
10379
-
CVE
-
2017
-
10286
-
CVE
-
2017
-
3636
-
CVE
-
2017
-
3641
-
CVE
-
2017
-
3653
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment