commit 2bb18a8cf1170b7c506b9c57640d8798a3b74298
Author: Otto Kekäläinen <otto@debian.org>
Date: Fri Jan 2 17:27:44 2026 -0800
Salsa CI: Remove failing 'mariadb-10.3 and Buster upgrade' job
The job 'mariadb-10.3 and Buster upgrade' was passing on December 23rd,
2025, but was failing on a run a week later. The error log ends with apt
nagging about unmet dependencies, as libedit2:amd64 depends libc6 version
2.42 or newer, which can't be installed due to the usrmerge workarounds
that force the libc version to be help 2.38 on Buster upgrades.
Instead of sinking effort in evolving the workaround, simply disable the
job as it failing is clearly not a sign of anything regressing in the
MariaDB packaging and keepign tests for upgrading from Buster has very low
value now that it is the release is long deprecated.
commit 79863d61bdbe48d55589da9ca4d700b0a9680a2b
Author: Otto Kekäläinen <otto@debian.org>
Date: Mon Dec 22 15:05:43 2025 -0800
Add tentative upstream patch to fix amd64v3 build issues (MDEV-38398)
Also disable two tests that failed on Launchpad.net to ensure builds and
the 'main' test suite in mariadb-test-run pass and migrations from
Ubuntu resolute-proposed to resolute don't get obstructed in vain on
tiny issues.
Note that `DEB_HOST_ARCH` on `amd64v3` is still `amd64`.
commit d966b97b757fc02234179e85dcbd8f892f31f21e
Author: Otto Kekäläinen <otto@debian.org>
Date: Mon Dec 22 15:04:22 2025 -0800
Open new changelog entry
commit c2af0e3428c4eff98ee919a7b821b8fd13857473
Author: Aquila Macedo <aquilamacedo@riseup.net>
Date: Thu Dec 18 19:10:35 2025 -0500
Handle missing /etc/mysql/debian.cnf
/etc/mysql/debian.cnf is a legacy credentials file from old
installations and is not present on new installs. Do not hardcode
--defaults-file or --defaults-extra-file pointing to it.
Only pass the option when /etc/mysql/debian.cnf is readable, so service
restarts and admin/upgrade commands do not fail when the file is absent.
Closes: #1056120
There is 1 open security issue in trixie.
You can find information about how to handle this issue in the security team's documentation.
There is 1 open security issue in bookworm.
You can find information about how to handle this issue in the security team's documentation.
Among the 15 debian patches available in version 1:11.8.5-3 of the package, we noticed the following issues: