summaryrefslogtreecommitdiff
path: root/databases/mysql57-client/distinfo
diff options
context:
space:
mode:
authoradam <adam>2016-12-12 19:18:40 +0000
committeradam <adam>2016-12-12 19:18:40 +0000
commit0056fa131dfc5833434adeb8588d1ffb960aea4e (patch)
treeb000ddb09191c9be39aec96520b223dcf9254a83 /databases/mysql57-client/distinfo
parent0e1cdd7d3e362e43f3596f71703e9509c559d082 (diff)
downloadpkgsrc-0056fa131dfc5833434adeb8588d1ffb960aea4e.tar.gz
Changes 5.7.17:
Compilation Notes ----------------- For GCC versions higher than 4.4, -fno-expensive-optimizations was replaced with -ffp-contract=off, which has the effect of enabling more optimizations. Security Notes -------------- Incompatible Change: These changes were made to mysqld_safe: * Unsafe use of rm and chown in mysqld_safe could result in privilege escalation. chown now can be used only when the target directory is /var/log. An incompatible change is that if the directory for the Unix socket file is missing, it is no longer created; instead, an error occurs. Due to these changes, /bin/bash is required to run mysqld_safe on Solaris. /bin/sh is still used on other Unix/Linux platforms. * The --ledir option now is accepted only on the command line, not in option files. * mysqld_safe ignores the current working directory. Other related changes: * Initialization scripts that invoke mysqld_safe pass --basedir explicitly. * Initialization scripts create the error log file only if the base directory is /var/log or /var/lib. * Unused systemd files for SLES were removed. * MySQL Server now includes a plugin library that enables administrators to introduce an increasing delay in server response to clients after a certain number of consecutive failed connection attempts. This capability provides a deterrent that slows down brute force attacks that attempt to access MySQL user accounts. For more information, see The Connection-Control Plugin. * OpenSSL is ending support for version 1.0.1 in December 2016; see https://www.openssl.org/policies/releasestrat.html. Consequently, MySQL Commercial Server builds now use version 1.0.2 rather than version 1.0.1, and the linked OpenSSL library for the MySQL Commercial Server has been updated from version 1.0.1 to version 1.0.2j. For a description of issues fixed in this version, see https://www.openssl.org/news/vulnerabilities.html. This change does not affect the Oracle-produced MySQL Community build of MySQL Server, which uses the yaSSL library instead.
Diffstat (limited to 'databases/mysql57-client/distinfo')
-rw-r--r--databases/mysql57-client/distinfo10
1 files changed, 5 insertions, 5 deletions
diff --git a/databases/mysql57-client/distinfo b/databases/mysql57-client/distinfo
index 1ff70e7c397..5a872058cc3 100644
--- a/databases/mysql57-client/distinfo
+++ b/databases/mysql57-client/distinfo
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.3 2016/10/14 19:28:28 adam Exp $
+$NetBSD: distinfo,v 1.4 2016/12/12 19:19:42 adam Exp $
-SHA1 (mysql-5.7.16.tar.gz) = 438ce81b85f45f8f724b5f820557a8f0a0bd34bb
-RMD160 (mysql-5.7.16.tar.gz) = 3fcda13b2d321d6975d0fa201c3314791f014aa1
-SHA512 (mysql-5.7.16.tar.gz) = 66a9a41a3813de2099d7eee45d170d79944e79e49782f852d6f3b9c6e22be912520c0ae430dea2c8f38e8ca657052903d5f5b2227485feda6cf8f2b1580b3d07
-Size (mysql-5.7.16.tar.gz) = 50509574 bytes
+SHA1 (mysql-5.7.17.tar.gz) = 7d159e2d056ab6e10c89e0c8ef12ee7af3b99ef0
+RMD160 (mysql-5.7.17.tar.gz) = acd8714fe1bda26466c4490b9e71d510677ac9a5
+SHA512 (mysql-5.7.17.tar.gz) = 72ef29298354234666264497e302994d4965ddc76129f564d51b48cbeb32f1b012a76d0905be238c8818507e0e5cf68d066e11788077351502880a358ea0df4b
+Size (mysql-5.7.17.tar.gz) = 51433090 bytes
SHA1 (patch-CMakeLists.txt) = b47592cf8801538375da3df2990fde4d292fc365
SHA1 (patch-client_CMakeLists.txt) = 304023577ab9c2152ca21fa9ff4895a22a321adf
SHA1 (patch-client_completion_hash.cc) = b86ec80beac624b2aa21c7587e351ff126400ecb