Jump to content

mystified

Platinum
  • Posts

    5828
  • Joined

  • Last visited

Everything posted by mystified

  1. Mandrakesoft Security Advisories Package name spamassassin Date August 18th, 2004 Advisory ID MDKSA-2004:084 Affected versions 9.1, 9.2, 10.0, CS2.1 Synopsis Updated spamassassin packages fixes possible malformed message vulnerability Problem Description Security fix prevents a denial of service attack open to certain malformed messages; this DoS affects all SpamAssassin 2.5x and 2.6x versions to date. Updated Packages Mandrakelinux 9.1 2cae1384e9d5681afaf33bb987666e38 9.1/RPMS/spamassassin-2.44-1.1.91mdk.i586.rpm f9de623c91ad5fea6a77278fb3c806e2 9.1/RPMS/spamassassin-tools-2.44-1.1.91mdk.i586.rpm c6e83539afe0d816aa7aa60423ec25f5 9.1/RPMS/perl-Mail-SpamAssassin-2.44-1.1.91mdk.i586.rpm 816b118e15d228db4073242470a0544c 9.1/SRPMS/spamassassin-2.44-1.1.91mdk.src.rpm Mandrakelinux 9.1/PPC c8746cb07bb27db5525745d7596dd1bb ppc/9.1/RPMS/spamassassin-2.44-1.1.91mdk.ppc.rpm 87623c4ec0adff188646c7d07d153c69 ppc/9.1/RPMS/spamassassin-tools-2.44-1.1.91mdk.ppc.rpm da8537bffa927c435c4fef88fbbee4eb ppc/9.1/RPMS/perl-Mail-SpamAssassin-2.44-1.1.91mdk.ppc.rpm 816b118e15d228db4073242470a0544c ppc/9.1/SRPMS/spamassassin-2.44-1.1.91mdk.src.rpm Mandrakelinux 9.2 321c26941160d803263f1f49e9fb0b80 9.2/RPMS/spamassassin-2.55-2.1.92mdk.i586.rpm 4e81f648eaf1a4cfefa4997fe13eb2c9 9.2/RPMS/spamassassin-tools-2.55-2.1.92mdk.i586.rpm 4408fec0d9a9a6a84a2d01345a8a3b37 9.2/RPMS/perl-Mail-SpamAssassin-2.55-2.1.92mdk.i586.rpm 677be35edf38a7363f3714092b12439a 9.2/SRPMS/spamassassin-2.55-2.1.92mdk.src.rpm Mandrakelinux 9.2/AMD64 61a2929f0ef503d24252b083692356f1 amd64/9.2/RPMS/spamassassin-2.55-2.1.92mdk.amd64.rpm 2823caa21693d9d430624dd5e15e7c84 amd64/9.2/RPMS/spamassassin-tools-2.55-2.1.92mdk.amd64.rpm 1e9fa6fc40a39e3a7c55a67b6b9daa81 amd64/9.2/RPMS/perl-Mail-SpamAssassin-2.55-2.1.92mdk.amd64.rpm 677be35edf38a7363f3714092b12439a amd64/9.2/SRPMS/spamassassin-2.55-2.1.92mdk.src.rpm Mandrakelinux 10.0 5b523cae997b928ef74bcb147bc3dc58 10.0/RPMS/spamassassin-2.63-2.1.100mdk.i586.rpm 648b4aec9d3839102474a18665eb417a 10.0/RPMS/spamassassin-tools-2.63-2.1.100mdk.i586.rpm 764a571c8f7d0ba495da185a1c1ad1fd 10.0/RPMS/perl-Mail-SpamAssassin-2.63-2.1.100mdk.i586.rpm aeec218cb9e05fc9e0a39b6232b3ffb0 10.0/SRPMS/spamassassin-2.63-2.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 09df0a5b383eb0d41575a1f529ab5c0a amd64/10.0/RPMS/spamassassin-2.63-2.1.100mdk.amd64.rpm 55400288a24bee8fc161ff6ee09a43bf amd64/10.0/RPMS/spamassassin-tools-2.63-2.1.100mdk.amd64.rpm 3e80a6cf3cc98ca8e50f038462542dfc amd64/10.0/RPMS/perl-Mail-SpamAssassin-2.63-2.1.100mdk.amd64.rpm aeec218cb9e05fc9e0a39b6232b3ffb0 amd64/10.0/SRPMS/spamassassin-2.63-2.1.100mdk.src.rpm Corporate Server 2.1/X86_64 308c5c891528d7647a859a0e06c476c4 x86_64/corporate/2.1/RPMS/spamassassin-2.53-1.1.C21mdk.x86_64.rpm 9d8fa372922261e3c9a7d972a4ddb4da x86_64/corporate/2.1/RPMS/spamassassin-tools-2.53-1.1.C21mdk.x86_64.rpm 324109473351331503ebf0e949a5eacf x86_64/corporate/2.1/RPMS/perl-Mail-SpamAssassin-2.53-1.1.C21mdk.x86_64.rpm bb4068503f9f85f1174c312edaa42c50 x86_64/corporate/2.1/SRPMS/spamassassin-2.53-1.1.C21mdk.src.rpm References http://marc.theaimsgroup.com/?l=spamassass...68121628767&w=2 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is perfor
  2. Mandrakesoft Security Advisories Package name galeon/epiphany Date August 18th, 2004 Advisory ID MDKA-2004:037 Affected versions 10.0 Synopsis Updated galeon and epiphany packages built against latest mozilla Problem Description Some of the security changes made to Mozilla in MDKSA-2004:082 had an adverse effect on the galeon and epiphany browsers in Mandrakelinux 10.0, and as a result right- and middle-clicks would no longer work properly. The updated packages are rebuilt against the latest Mozilla from security updates to bring this necessary functionality back. Updated Packages Mandrakelinux 10.0 61bc97458c735d2e5a742af90bdd87b9 10.0/RPMS/epiphany-1.0.7-7.1.100mdk.i586.rpm 193fb52e94d74316861134b41125504b 10.0/RPMS/epiphany-devel-1.0.7-7.1.100mdk.i586.rpm 152dc293feae784c94cafd584e723b6d 10.0/RPMS/galeon-1.3.12-4.1.100mdk.i586.rpm 99dec37a271bfd69a99c20ddcb00230b 10.0/SRPMS/epiphany-1.0.7-7.1.100mdk.src.rpm caa35f9a053c8046431159e699af918d 10.0/SRPMS/galeon-1.3.12-4.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 c8cefc2693e3f89f6f0a2b239cfe9305 amd64/10.0/RPMS/epiphany-1.0.7-7.1.100mdk.amd64.rpm 7bad1bfcacfb98d92da33f2cebf69c91 amd64/10.0/RPMS/epiphany-devel-1.0.7-7.1.100mdk.amd64.rpm 320508cd808fc767588734234f193fb1 amd64/10.0/RPMS/galeon-1.3.12-4.1.100mdk.amd64.rpm 99dec37a271bfd69a99c20ddcb00230b amd64/10.0/SRPMS/epiphany-1.0.7-7.1.100mdk.src.rpm caa35f9a053c8046431159e699af918d amd64/10.0/SRPMS/galeon-1.3.12-4.1.100mdk.src.rpm Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  3. Mandrakesoft Security Advisories Package name rsync Date August 17th, 2004 Advisory ID MDKSA-2004:083 Affected versions 9.1, 9.2, 10.0, MNF8.2, CS2.1 Synopsis Updated rsync packages fix remotely-exploitable vulnerability Problem Description An advisory was sent out by the rsync team regarding a security vulnerability in all versions of rsync prior to and including 2.6.2. If rsync is running in daemon mode, and not in a chrooted environment, it is possible for a remote attacker to trick rsyncd into creating an absolute pathname while sanitizing it. This vulnerability allows a remote attacker to possibly read/write to/from files outside of the rsync directory. The updated packages are patched to prevent this problem. Updated Packages Mandrakelinux 9.1 98098a144b62ed85da5778b63293f614 9.1/RPMS/rsync-2.5.7-0.3.91mdk.i586.rpm 088606d2269e99f9f8dd99c095744ec3 9.1/SRPMS/rsync-2.5.7-0.3.91mdk.src.rpm Mandrakelinux 9.1/PPC 8f5cc0a974b614bbe63ac01445c54ac3 ppc/9.1/RPMS/rsync-2.5.7-0.3.91mdk.ppc.rpm 088606d2269e99f9f8dd99c095744ec3 ppc/9.1/SRPMS/rsync-2.5.7-0.3.91mdk.src.rpm Mandrakelinux 9.2 1fef094e97d7c40a2892167e19605dc3 9.2/RPMS/rsync-2.5.7-0.3.92mdk.i586.rpm b98e8c0684ab6dd8b9f30b45de076e95 9.2/SRPMS/rsync-2.5.7-0.3.92mdk.src.rpm Mandrakelinux 9.2/AMD64 06e06a5c39ecdeec4780c7026041f339 amd64/9.2/RPMS/rsync-2.5.7-0.3.92mdk.amd64.rpm b98e8c0684ab6dd8b9f30b45de076e95 amd64/9.2/SRPMS/rsync-2.5.7-0.3.92mdk.src.rpm Mandrakelinux 10.0 1b4b64408f1d5db5f4f700de0a4add13 10.0/RPMS/rsync-2.6.0-1.2.100mdk.i586.rpm 094ec110689e485c178adf3310e7e86e 10.0/SRPMS/rsync-2.6.0-1.2.100mdk.src.rpm Mandrakelinux 10.0/AMD64 20a09fc79f54be4c14c09bc4bb9652fe amd64/10.0/RPMS/rsync-2.6.0-1.2.100mdk.amd64.rpm 094ec110689e485c178adf3310e7e86e amd64/10.0/SRPMS/rsync-2.6.0-1.2.100mdk.src.rpm Multi Network Firewall 8.2 b2cd2101e8900eb64b8a4fe0cf527c7e mnf8.2/RPMS/rsync-2.5.4-2.3.M82mdk.i586.rpm 9bf7b6090f06886ca50715127ae06618 mnf8.2/SRPMS/rsync-2.5.4-2.3.M82mdk.src.rpm Corporate Server 2.1 4de66f34494f397f921cb364aeeaa162 corporate/2.1/RPMS/rsync-2.5.5-5.3.C21mdk.i586.rpm 61cf910f7e318be0b3b247ce0568b09c corporate/2.1/SRPMS/rsync-2.5.5-5.3.C21mdk.src.rpm Corporate Server 2.1/X86_64 0007ae94030d0b6ee773170deb30d867 x86_64/corporate/2.1/RPMS/rsync-2.5.5-5.3.C21mdk.x86_64.rpm 61cf910f7e318be0b3b247ce0568b09c x86_64/corporate/2.1/SRPMS/rsync-2.5.5-5.3.C21mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0792 http://samba.org/rsync/#security_aug04 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  4. I run more than one emerge at a time. I'm just careful that there are no conflicts.
  5. I thought mandrake by default set it up as secure with https://localhost:10000?
  6. I use mm-sources. My first install was with genkernel and it was a bust but I think there were other factors involved so I can't blaim it on the kernel.
  7. ok, it was computergear and not thinkgeek. Had to go looking! :D http://store.yahoo.com/computergear/linuxkeyset.html
  8. I don't have windows keys on my keyboard. I got some replacement keys at thinkgeek. Now I have tux instead. :P
  9. Think it'll be thru by then? :lol:
  10. I'm compiling KDE 3.3.0 atm. Can't wait to see what changes are in store! :D
  11. Well that's the most important part isn't it?
  12. But many people do not have ownership. If paul disappeared (which I hope will never happen) then who would be able to point the dns to another server if you decide to drop us? (Not saying that would happen either) But we are only guaranteed one year of hosting in return for the ads on this board. Yes, we do have to trust. And I'm hoping for the best.
  13. correction...paul owns the domain name, anon owns the server ;) (i know, it's a little ) many people have ownership = no one can disappear in to thin air, and wreck havoc ;) ALA Tom <{POST_SNAPBACK}> I'm confused. I thought kernow-hosting.com aka you, anon and scoopy have ownership of this board.
  14. Sorry bvc but this was xanthic's response:
  15. That skin isn't available thru Invisionize where I get the other skins but I have sent a pm to the board owner asking if it would be available for download. Will keep you posted.
  16. I was sick of Windoze like a lot of people and I had done some research on the web without much luck. One day I decided to take the step so I went to Best Buy's online site, found the cheapest linux distro and went to the store and bought it. I'm really glad it was Mandrake cause it made things so easy for me. Now I've moved onto Gentoo but I'll always be fond of Mandrake.
  17. Package name mozilla Date August 12th, 2004 Advisory ID MDKSA-2004:082 Affected versions 9.2, 10.0 Synopsis Updated mozilla packages fix multiple vulnerabilities Problem Description A number of security vulnerabilities in mozilla are addressed by this update for Mandrakelinux 10.0 users, including a fix for frame spoofing, a fixed popup XPInstall/security dialog bug, a fix for untrusted chrome calls, a fix for SSL certificate spoofing, a fix for stealing secure HTTP Auth passwords via DNS spoofing, a fix for insecure matching of cert names for non-FQDNs, a fix for focus redefinition from another domain, a fix for a SOAP parameter overflow, a fix for text drag on file entry, a fix for certificate DoS, and a fix for lock icon and cert spoofing. Additionally, mozilla for both Mandrakelinux 9.2 and 10.0 have been rebuilt to use the system libjpeg and libpng which addresses vulnerabilities discovered in libpng (ref: MDKSA-2004:079). Updated Packages Mandrakelinux 9.2 39f8a9919bf499e7e889d2f857fa930c 9.2/RPMS/libnspr4-1.4-13.3.92mdk.i586.rpm 0ca14f5d18f20b75015140db28c18751 9.2/RPMS/libnspr4-devel-1.4-13.3.92mdk.i586.rpm f663c0295b8b27489802a913115660e1 9.2/RPMS/libnss3-1.4-13.3.92mdk.i586.rpm cf80137d87041af69f724f4d3bae21ee 9.2/RPMS/libnss3-devel-1.4-13.3.92mdk.i586.rpm eb592c81a204899305540827f831178f 9.2/RPMS/mozilla-1.4-13.3.92mdk.i586.rpm 7cef1eab0eb7c38aed0743570912dbc1 9.2/RPMS/mozilla-devel-1.4-13.3.92mdk.i586.rpm cbbcb63f5db34ab4342bd79d9a0edbaa 9.2/RPMS/mozilla-dom-inspector-1.4-13.3.92mdk.i586.rpm 4a16188a7091803a643278d27c0bedd9 9.2/RPMS/mozilla-enigmail-1.4-13.3.92mdk.i586.rpm 2f247ec2b03fa15358bef296cbf5b5fa 9.2/RPMS/mozilla-enigmime-1.4-13.3.92mdk.i586.rpm d372cb79f4137257a5ecc2f8bba50058 9.2/RPMS/mozilla-irc-1.4-13.3.92mdk.i586.rpm 7123054edd8308a9389eef15204db3f3 9.2/RPMS/mozilla-js-debugger-1.4-13.3.92mdk.i586.rpm f4a920a8b551d78066dc23eb8c7a6520 9.2/RPMS/mozilla-mail-1.4-13.3.92mdk.i586.rpm 4b486d04fbf4c34217ec1fe272bde217 9.2/RPMS/mozilla-spellchecker-1.4-13.3.92mdk.i586.rpm bbd208cba121308110ff629941999d4e 9.2/SRPMS/mozilla-1.4-13.3.92mdk.src.rpm Mandrakelinux 9.2/AMD64 5a5ce0f34c6d517dac5bd796539d727b amd64/9.2/RPMS/lib64nspr4-1.4-13.3.92mdk.amd64.rpm 95ff73b58ff07df8658ba7db479a6409 amd64/9.2/RPMS/lib64nspr4-devel-1.4-13.3.92mdk.amd64.rpm f47f3edc3305680e4dfe6fc4f11da651 amd64/9.2/RPMS/lib64nss3-1.4-13.3.92mdk.amd64.rpm 9ffc28e6db6dae88d3f61f647407a863 amd64/9.2/RPMS/lib64nss3-devel-1.4-13.3.92mdk.amd64.rpm 986fff85fd8f3826df7a503da6123cd8 amd64/9.2/RPMS/mozilla-1.4-13.3.92mdk.amd64.rpm 0b3800d499e9b0a38e7d45af293f93cc amd64/9.2/RPMS/mozilla-devel-1.4-13.3.92mdk.amd64.rpm 786af5e02f3a30b091155c7fbe361052 amd64/9.2/RPMS/mozilla-dom-inspector-1.4-13.3.92mdk.amd64.rpm 65987dda19d9f901d84e2bd364395970 amd64/9.2/RPMS/mozilla-enigmail-1.4-13.3.92mdk.amd64.rpm 0b4d182f8aeac8e5189aa58475de3368 amd64/9.2/RPMS/mozilla-enigmime-1.4-13.3.92mdk.amd64.rpm 7fefe5af19372137780d21fc286cce3c amd64/9.2/RPMS/mozilla-irc-1.4-13.3.92mdk.amd64.rpm 7dd3a9b2be038019e19a7839f015f952 amd64/9.2/RPMS/mozilla-js-debugger-1.4-13.3.92mdk.amd64.rpm 90e24a878db2c4dbad41322595c0f67c amd64/9.2/RPMS/mozilla-mail-1.4-13.3.92mdk.amd64.rpm 2225c48c1e6ef9113fffad76a278b7f8 amd64/9.2/RPMS/mozilla-spellchecker-1.4-13.3.92mdk.amd64.rpm bbd208cba121308110ff629941999d4e amd64/9.2/SRPMS/mozilla-1.4-13.3.92mdk.src.rpm Mandrakelinux 10.0 19b31b7ed83a5bfd62872777f48c2251 10.0/RPMS/libnspr4-1.6-12.1.100mdk.i586.rpm 2c751db4638e066a8089dde8eb2b940b 10.0/RPMS/libnspr4-devel-1.6-12.1.100mdk.i586.rpm f44262d9e905090a756ebee318b00e14 10.0/RPMS/libnss3-1.6-12.1.100mdk.i586.rpm ac3f3659e97a43a62ce6e574885a7ddf 10.0/RPMS/libnss3-devel-1.6-12.1.100mdk.i586.rpm c60181755c6de63f125940311bb0d075 10.0/RPMS/mozilla-1.6-12.1.100mdk.i586.rpm 880ed64c45f293c64f9756b39334b82d 10.0/RPMS/mozilla-devel-1.6-12.1.100mdk.i586.rpm f14a0240536662e2a43b4133ba2fd1b2 10.0/RPMS/mozilla-dom-inspector-1.6-12.1.100mdk.i586.rpm 0f5f524ff411923f3c542a40d81caab3 10.0/RPMS/mozilla-enigmail-1.6-12.1.100mdk.i586.rpm 2138a4308f6287b2a26a0ee509c732a4 10.0/RPMS/mozilla-enigmime-1.6-12.1.100mdk.i586.rpm ac4f3906cf8db1d57722a2485eb5fba5 10.0/RPMS/mozilla-irc-1.6-12.1.100mdk.i586.rpm bc535199a712e47ca30d93ad448513c1 10.0/RPMS/mozilla-js-debugger-1.6-12.1.100mdk.i586.rpm 4e1c2b9fae3b96a8a4821386f8cde4a0 10.0/RPMS/mozilla-mail-1.6-12.1.100mdk.i586.rpm 60384666732ca5895ea1696fd0088d45 10.0/RPMS/mozilla-spellchecker-1.6-12.1.100mdk.i586.rpm 4261307ca2dfbc1bf7ee53fa0d9cadda 10.0/SRPMS/mozilla-1.6-12.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 f950ed0e8c533c272b89242b285bfb51 amd64/10.0/RPMS/lib64nspr4-1.6-12.1.100mdk.amd64.rpm 1da39ad805ac3dfb6e15f4e2a4b81395 amd64/10.0/RPMS/lib64nspr4-devel-1.6-12.1.100mdk.amd64.rpm 82541944b78f9ae28b8fbaad7d8cff7f amd64/10.0/RPMS/lib64nss3-1.6-12.1.100mdk.amd64.rpm 7a1755840c9e86c6d9d3b0700fe22a64 amd64/10.0/RPMS/lib64nss3-devel-1.6-12.1.100mdk.amd64.rpm bbad752b3e6173227dbe3e10d2e22b7e amd64/10.0/RPMS/mozilla-1.6-12.1.100mdk.amd64.rpm 160581d9505230143d3af6c0a68dbb50 amd64/10.0/RPMS/mozilla-devel-1.6-12.1.100mdk.amd64.rpm a1e933df64ffb535c48f58efcb56f744 amd64/10.0/RPMS/mozilla-dom-inspector-1.6-12.1.100mdk.amd64.rpm 5b72c641ece4f0f086b9aac12623e4a5 amd64/10.0/RPMS/mozilla-enigmail-1.6-12.1.100mdk.amd64.rpm 6c55c3641ce9af81569179f2e0883571 amd64/10.0/RPMS/mozilla-enigmime-1.6-12.1.100mdk.amd64.rpm de69eccc5e36ee64808b6465cdd2f2cf amd64/10.0/RPMS/mozilla-irc-1.6-12.1.100mdk.amd64.rpm c8bfd663339969ee8ed98f5fcb489772 amd64/10.0/RPMS/mozilla-js-debugger-1.6-12.1.100mdk.amd64.rpm 36aaa030ab4cce56c7e213f36e899662 amd64/10.0/RPMS/mozilla-mail-1.6-12.1.100mdk.amd64.rpm f617cce1aca29d7b55c22c7d71cbe706 amd64/10.0/RPMS/mozilla-spellchecker-1.6-12.1.100mdk.amd64.rpm 4261307ca2dfbc1bf7ee53fa0d9cadda amd64/10.0/SRPMS/mozilla-1.6-12.1.100mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599 http://bugzilla.mozilla.org/show_bug.cgi?id=246448 http://bugzilla.mozilla.org/show_bug.cgi?id=162020 http://bugzilla.mozilla.org/show_bug.cgi?id=149478 http://bugzilla.mozilla.org/show_bug.cgi?id=239580 http://bugzilla.mozilla.org/show_bug.cgi?id=244965 http://bugzilla.mozilla.org/show_bug.cgi?id=229374 http://bugzilla.mozilla.org/show_bug.cgi?id=240053 http://bugzilla.mozilla.org/show_bug.cgi?id=226278 http://bugzilla.mozilla.org/show_bug.cgi?id=234058 http://bugzilla.mozilla.org/show_bug.cgi?id=86028 http://bugzilla.mozilla.org/show_bug.cgi?id=236618 http://bugzilla.mozilla.org/show_bug.cgi?id=206859 http://bugzilla.mozilla.org/show_bug.cgi?id=249004 http://bugzilla.mozilla.org/show_bug.cgi?id=253121 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  18. Mandrakesoft Security Advisories Package name gaim Date August 12th, 2004 Advisory ID MDKSA-2004:081 Affected versions 9.2, 10.0 Synopsis Updated gaim packages fix remotely exploitable vulnerabilities Problem Description Sebastian Krahmer discovered two remotely exploitable buffer overflow vulnerabilities in the gaim instant messenger. The updated packages are patched to correct the problems. Updated Packages Mandrakelinux 9.2 e98c583bb9c3943993fbd56c6a81919e 9.2/RPMS/gaim-0.75-1.4.92mdk.i586.rpm 11d435795713f8358ac35a3b41ef9a34 9.2/RPMS/gaim-encrypt-0.75-1.4.92mdk.i586.rpm ef120aa0028475e83d9a517eaf621655 9.2/RPMS/gaim-festival-0.75-1.4.92mdk.i586.rpm 4ec686dec9501be0f64e4ae3819ffbb7 9.2/RPMS/gaim-perl-0.75-1.4.92mdk.i586.rpm 6a83e3edb461168b5dbe3302afd7613d 9.2/RPMS/libgaim-remote0-0.75-1.4.92mdk.i586.rpm 7363ae25ab1b9e505f8fc4bd87f5cb23 9.2/RPMS/libgaim-remote0-devel-0.75-1.4.92mdk.i586.rpm d00e9aebb8e72bc383b7bf92738ba760 9.2/SRPMS/gaim-0.75-1.4.92mdk.src.rpm Mandrakelinux 9.2/AMD64 dfee511b5d144d18b2cf68faa9a7b223 amd64/9.2/RPMS/gaim-0.75-1.4.92mdk.amd64.rpm d3fe81c29663245a9f9bad8d60a3ac1a amd64/9.2/RPMS/gaim-encrypt-0.75-1.4.92mdk.amd64.rpm 267917ef901b303e8a310a7dc7e30f48 amd64/9.2/RPMS/gaim-festival-0.75-1.4.92mdk.amd64.rpm 100e0b60e07a1c3efc68a7020cff4be1 amd64/9.2/RPMS/gaim-perl-0.75-1.4.92mdk.amd64.rpm 46cb3c308880118d37c1a64cfbf35d41 amd64/9.2/RPMS/lib64gaim-remote0-0.75-1.4.92mdk.amd64.rpm 309b8b6fe13048051319848222223f28 amd64/9.2/RPMS/lib64gaim-remote0-devel-0.75-1.4.92mdk.amd64.rpm d00e9aebb8e72bc383b7bf92738ba760 amd64/9.2/SRPMS/gaim-0.75-1.4.92mdk.src.rpm Mandrakelinux 10.0 cd9dd302c9cf47474de3b68162e038d7 10.0/RPMS/gaim-0.75-5.2.100mdk.i586.rpm e6e3b3ba3f58b754ba67c1df966fd2b5 10.0/RPMS/gaim-encrypt-0.75-5.2.100mdk.i586.rpm 065fc37af5a298e7d50e164ce3dda44a 10.0/RPMS/gaim-festival-0.75-5.2.100mdk.i586.rpm b3f5a8d16d3d103087518aaa3e65f157 10.0/RPMS/gaim-perl-0.75-5.2.100mdk.i586.rpm 93226c0caef4ea3580056816fb1cf1c9 10.0/RPMS/libgaim-remote0-0.75-5.2.100mdk.i586.rpm da6cf3c123ba4ba3847b4fda08fa0561 10.0/RPMS/libgaim-remote0-devel-0.75-5.2.100mdk.i586.rpm 56e190d0008657188b8faad013da92d6 10.0/SRPMS/gaim-0.75-5.2.100mdk.src.rpm Mandrakelinux 10.0/AMD64 9be3eaff0c3562c758c8228d1dea00a1 amd64/10.0/RPMS/gaim-0.75-5.2.100mdk.amd64.rpm e3074c7a9517e92cf78cca45f984a29f amd64/10.0/RPMS/gaim-encrypt-0.75-5.2.100mdk.amd64.rpm f69b4c70daf8abb5bc6a75436e8291b7 amd64/10.0/RPMS/gaim-festival-0.75-5.2.100mdk.amd64.rpm 66964eaea125fc331631933b1d98c6a7 amd64/10.0/RPMS/gaim-perl-0.75-5.2.100mdk.amd64.rpm 9828f602d92f5c5b08e9a2077efcb765 amd64/10.0/RPMS/lib64gaim-remote0-0.75-5.2.100mdk.amd64.rpm 6c4a8298b328a4854c01010a7cca0bf2 amd64/10.0/RPMS/lib64gaim-remote0-devel-0.75-5.2.100mdk.amd64.rpm 56e190d0008657188b8faad013da92d6 amd64/10.0/SRPMS/gaim-0.75-5.2.100mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0500 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  19. Mandrakesoft Security Advisories Package name shorewall Date August 9th, 2004 Advisory ID MDKSA-2004:080 Affected versions 9.1, 9.2, 10.0, MNF8.2, CS2.1 Synopsis Updated shorewall packages fix temporary file vulnerabilities Problem Description The shorewall package has a vulnerability when creating temporary files and directories, which could allow non-root users to overwrite arbitrary files on the system. The updated packages are patched to fix the problem. As well, for Mandrakelinux 10.0, the updated packages have been fixed to start shorewall after the network, rather than before. After updating the package, if shorewall was previously running, you may need to issue a "service shorewall restart". Updated Packages Mandrakelinux 9.1 bf683f629f2ae25d9bb2bc30d162415c 9.1/RPMS/shorewall-1.3.14-3.1.91mdk.noarch.rpm b39b2f3ba5eb851556e4105c7accbf43 9.1/RPMS/shorewall-doc-1.3.14-3.1.91mdk.noarch.rpm b45b025c98066c62fd2b4278f2dc9062 9.1/SRPMS/shorewall-1.3.14-3.1.91mdk.src.rpm Mandrakelinux 9.1/PPC bf683f629f2ae25d9bb2bc30d162415c ppc/9.1/RPMS/shorewall-1.3.14-3.1.91mdk.noarch.rpm b39b2f3ba5eb851556e4105c7accbf43 ppc/9.1/RPMS/shorewall-doc-1.3.14-3.1.91mdk.noarch.rpm b45b025c98066c62fd2b4278f2dc9062 ppc/9.1/SRPMS/shorewall-1.3.14-3.1.91mdk.src.rpm Mandrakelinux 9.2 98bf1313a5a801d61701b191418e9ba6 9.2/RPMS/shorewall-1.4.8-2.2.92mdk.noarch.rpm bc20ced6f86f69eb2eb18af32bdc7ff4 9.2/RPMS/shorewall-doc-1.4.8-2.2.92mdk.noarch.rpm 13dbb927824a915fca48448b0d155220 9.2/SRPMS/shorewall-1.4.8-2.2.92mdk.src.rpm Mandrakelinux 9.2/AMD64 98bf1313a5a801d61701b191418e9ba6 amd64/9.2/RPMS/shorewall-1.4.8-2.2.92mdk.noarch.rpm bc20ced6f86f69eb2eb18af32bdc7ff4 amd64/9.2/RPMS/shorewall-doc-1.4.8-2.2.92mdk.noarch.rpm 13dbb927824a915fca48448b0d155220 amd64/9.2/SRPMS/shorewall-1.4.8-2.2.92mdk.src.rpm Mandrakelinux 10.0 96c4da139879d4aae95561643903e352 10.0/RPMS/shorewall-2.0.1-3.2.100mdk.noarch.rpm 1c883024ba09642b4bc32504782dade4 10.0/RPMS/shorewall-doc-2.0.1-3.2.100mdk.noarch.rpm e4f8f24740148c170fefad97c10239de 10.0/SRPMS/shorewall-2.0.1-3.2.100mdk.src.rpm Mandrakelinux 10.0/AMD64 96c4da139879d4aae95561643903e352 amd64/10.0/RPMS/shorewall-2.0.1-3.2.100mdk.noarch.rpm 1c883024ba09642b4bc32504782dade4 amd64/10.0/RPMS/shorewall-doc-2.0.1-3.2.100mdk.noarch.rpm e4f8f24740148c170fefad97c10239de amd64/10.0/SRPMS/shorewall-2.0.1-3.2.100mdk.src.rpm Multi Network Firewall 8.2 547d4b1f55485e49b4afcb03efab433c mnf8.2/RPMS/shorewall-1.3.11-1.2.M82mdk.noarch.rpm 52fa078e31b2f128aedf7bbebe4b25bc mnf8.2/SRPMS/shorewall-1.3.11-1.2.M82mdk.src.rpm Corporate Server 2.1 e2ac99cdb648c3b2cfa371c8d8f86c27 corporate/2.1/RPMS/shorewall-1.3.7c-1.1.C21mdk.noarch.rpm 5c913cbdd7edec851003d0ac4de6c1cb corporate/2.1/RPMS/shorewall-doc-1.3.7c-1.1.C21mdk.noarch.rpm df9b686dc83b736e4a2b858290a11b2b corporate/2.1/SRPMS/shorewall-1.3.7c-1.1.C21mdk.src.rpm Corporate Server 2.1/X86_64 e2ac99cdb648c3b2cfa371c8d8f86c27 x86_64/corporate/2.1/RPMS/shorewall-1.3.7c-1.1.C21mdk.noarch.rpm 5c913cbdd7edec851003d0ac4de6c1cb x86_64/corporate/2.1/RPMS/shorewall-doc-1.3.7c-1.1.C21mdk.noarch.rpm df9b686dc83b736e4a2b858290a11b2b x86_64/corporate/2.1/SRPMS/shorewall-1.3.7c-1.1.C21mdk.src.rpm References http://lists.shorewall.net/pipermail/shore...une/000385.html Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  20. Mandrakesoft Security Advisories Package name printer-drivers Date August 9th, 2004 Advisory ID MDKA-2004:036 Affected versions 10.0 Synopsis Updated printer-drivers package fix various bugs Problem Description Updated printer-drivers packages are now available that fix a number of bugs and provide new drivers/functionality for existing drivers, including: - bug fixes in Foomatic, including a bug which prevented OpenOffice.org versions >1.1.0 from printing correctly. - higher quality of black text printing on HP DeskJets, Business InkJets, and OfficeJets; also more support models (HPIJS 1.6.1) - more Epson Inkets printers supported, bug fixes, and better photo quality (Gimp-Print 4.2.7 final) - update of the PostScript printer PPDs from HP and Kyocera - PostScript printer PPDs from Okidata - Epson-Kowa laser printer driver updated to support the newest workgroup and high-volume laser printers from Epson - many driver updates, including complete support for MicroDry printers (Alps MD-XXXX, Citizen printiva, Okidata DP-xxxx) - new drivers added, including support for a wide range of laser winprinters: Minolta PagePro 12xxW, 13xxW, magicolor 2300W, Canon LBP-460, LBP-660, Lexmark X74, X75, and some Casio label printers Updated Packages Mandrakelinux 10.0 69c73047d606a682dc9cce81404ee109 10.0/RPMS/cups-drivers-1.1-138.1.100mdk.i586.rpm afce411296d4b9b09476c2525d2b5ddc 10.0/RPMS/foomatic-db-3.0.1-0.20040802.1.1.100mdk.i586.rpm d6aa8fbf19a69f74d0ea5d7d00838f3c 10.0/RPMS/foomatic-db-engine-3.0.1-0.20040802.1.1.100mdk.i586.rpm 291ae576a7786a92e825f5edb2db4e14 10.0/RPMS/foomatic-filters-3.0.1-0.20040802.1.1.100mdk.i586.rpm b609fc355fd4f22e73679c0041fbf22e 10.0/RPMS/ghostscript-7.07-19.1.100mdk.i586.rpm b7d45afc7c1f177a2636334f9bf8bf2e 10.0/RPMS/ghostscript-module-X-7.07-19.1.100mdk.i586.rpm d17a8107523d1692421b379708c09616 10.0/RPMS/gimpprint-4.2.7-2.1.100mdk.i586.rpm fd1fd1485b090813cb0462947500361b 10.0/RPMS/libgimpprint1-4.2.7-2.1.100mdk.i586.rpm 22782c65118916246a59f385d7f25555 10.0/RPMS/libgimpprint1-devel-4.2.7-2.1.100mdk.i586.rpm 87f3a0e5dd6c2b617ac7ac98bda5e47b 10.0/RPMS/libijs0-0.34-76.1.100mdk.i586.rpm 282ff807e8700c6309a652b5d357eeb0 10.0/RPMS/libijs0-devel-0.34-76.1.100mdk.i586.rpm d3601bf91fd6b423a7d1c7a6e922dbf9 10.0/RPMS/printer-filters-1.0-138.1.100mdk.i586.rpm 95950af08e0b7fdd9590ae9d5a7e90ae 10.0/RPMS/printer-testpages-1.0-138.1.100mdk.i586.rpm b3070e513044bbbec7821772b87c13a7 10.0/RPMS/printer-utils-1.0-138.1.100mdk.i586.rpm bbd96cb5491ee12dfbf8717eaf37b5eb 10.0/SRPMS/printer-drivers-1.0-138.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 f4a11fa5ac7c388991e6fb247dae7abe amd64/10.0/RPMS/cups-drivers-1.1-138.1.100mdk.amd64.rpm 0a338fcb4bcee50d5c483a3defb3b7bf amd64/10.0/RPMS/foomatic-db-3.0.1-0.20040802.1.1.100mdk.amd64.rpm 7b575a1f8d48b60bdff25b3c7eace6c5 amd64/10.0/RPMS/foomatic-db-engine-3.0.1-0.20040802.1.1.100mdk.amd64.rpm f07e6038454c2cf890062e84b1832cef amd64/10.0/RPMS/foomatic-filters-3.0.1-0.20040802.1.1.100mdk.amd64.rpm 639f68df3584c7920daa8077e876cdfd amd64/10.0/RPMS/ghostscript-7.07-19.1.100mdk.amd64.rpm 83d0e60801c597461afa2096b2e5aad4 amd64/10.0/RPMS/ghostscript-module-X-7.07-19.1.100mdk.amd64.rpm 8956ba2cba3f2b07b3275aa5e5e82d91 amd64/10.0/RPMS/gimpprint-4.2.7-2.1.100mdk.amd64.rpm c2c54a88aaeab34f49472a3f7d33316b amd64/10.0/RPMS/lib64gimpprint1-4.2.7-2.1.100mdk.amd64.rpm 887e9ecae7c5b688134810ddb935ead4 amd64/10.0/RPMS/lib64gimpprint1-devel-4.2.7-2.1.100mdk.amd64.rpm ecc017e2f11807c6ae818f9177360376 amd64/10.0/RPMS/lib64ijs0-0.34-76.1.100mdk.amd64.rpm 60860f6783c6247890a4814f152f2f20 amd64/10.0/RPMS/lib64ijs0-devel-0.34-76.1.100mdk.amd64.rpm 34e3c3a847181227e3847e840d85661a amd64/10.0/RPMS/printer-filters-1.0-138.1.100mdk.amd64.rpm 03e9db0c407ec6825bd6ee9ae0591276 amd64/10.0/RPMS/printer-testpages-1.0-138.1.100mdk.amd64.rpm 5387caacf2fe80b8cfa5fd304c23cec3 amd64/10.0/RPMS/printer-utils-1.0-138.1.100mdk.amd64.rpm bbd96cb5491ee12dfbf8717eaf37b5eb amd64/10.0/SRPMS/printer-drivers-1.0-138.1.100mdk.src.rpm Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpda
  21. I'm running it on my daughter's PII with 192 mbs ram. Works just fine.
  22. Mandrakesoft Security Advisories Package name libpng Date August 4th, 2004 Advisory ID MDKSA-2004:079 Affected versions 9.1, 9.2, 10.0, MNF8.2, CS2.1 Synopsis Updated libpng packages fix multiple vulnerabilities Problem Description Chris Evans discovered numerous vulnerabilities in the libpng graphics library, including a remotely exploitable stack-based buffer overrun in the png_handle_tRNS function, dangerous code in png_handle_sBIT, a possible NULL-pointer crash in png_handle_iCCP (which is also duplicated in multiple other locations), a theoretical integer overflow in png_read_png, and integer overflows during progressive reading. All users are encouraged to upgrade immediately. Updated Packages Mandrakelinux 9.1 6fd39e5ee6bc8dc031bf3ea4608b2dcf 9.1/RPMS/libpng3-1.2.5-2.5.91mdk.i586.rpm e29e3f15812654860e80987ff169ed0a 9.1/RPMS/libpng3-devel-1.2.5-2.5.91mdk.i586.rpm f8fbbf2d3bd57ffb967a12fa84806793 9.1/RPMS/libpng3-static-devel-1.2.5-2.5.91mdk.i586.rpm c1f995c1738591bf1436386c19f220f8 9.1/SRPMS/libpng-1.2.5-2.5.91mdk.src.rpm Mandrakelinux 9.1/PPC db141bfa829164296790fc5ecaeca8af ppc/9.1/RPMS/libpng3-1.2.5-2.5.91mdk.ppc.rpm cf12eb035d71e045bca05a351d2e12b5 ppc/9.1/RPMS/libpng3-devel-1.2.5-2.5.91mdk.ppc.rpm 37ed0b8a240466482f3e3e079397aca3 ppc/9.1/RPMS/libpng3-static-devel-1.2.5-2.5.91mdk.ppc.rpm c1f995c1738591bf1436386c19f220f8 ppc/9.1/SRPMS/libpng-1.2.5-2.5.91mdk.src.rpm Mandrakelinux 9.2 73dcbcff5ec15f8d0c683e85357ba292 9.2/RPMS/libpng3-1.2.5-7.5.92mdk.i586.rpm 7d1493bececc9a48b84061b3eae8d92f 9.2/RPMS/libpng3-devel-1.2.5-7.5.92mdk.i586.rpm 32d8f720ff4f9e2dcfd7e07a7f3b221c 9.2/RPMS/libpng3-static-devel-1.2.5-7.5.92mdk.i586.rpm 9ada13b517e9d757874bd235de565fc8 9.2/SRPMS/libpng-1.2.5-7.5.92mdk.src.rpm Mandrakelinux 9.2/AMD64 ce8a91d600fba2cdcc4cbfa73528f0cd amd64/9.2/RPMS/lib64png3-1.2.5-7.5.92mdk.amd64.rpm 231a4e5d6f11d262bb5bc6b7563ad93f amd64/9.2/RPMS/lib64png3-devel-1.2.5-7.5.92mdk.amd64.rpm 1f63ad149a23fd5f2e9c9007b162235b amd64/9.2/RPMS/lib64png3-static-devel-1.2.5-7.5.92mdk.amd64.rpm 9ada13b517e9d757874bd235de565fc8 amd64/9.2/SRPMS/libpng-1.2.5-7.5.92mdk.src.rpm Mandrakelinux 10.0 5f2e0ce336d0854b79426e3ee2fc9c1c 10.0/RPMS/libpng3-1.2.5-10.5.100mdk.i586.rpm a08aee71d41f2fd270e657053ed16a18 10.0/RPMS/libpng3-devel-1.2.5-10.5.100mdk.i586.rpm 997b909be31340ab48a5c8266364d9f1 10.0/RPMS/libpng3-static-devel-1.2.5-10.5.100mdk.i586.rpm 5402d26cab5f03469f22f10e7279a64f 10.0/SRPMS/libpng-1.2.5-10.5.100mdk.src.rpm Mandrakelinux 10.0/AMD64 7f4dbf94ab247849e8efb3034c6bb046 amd64/10.0/RPMS/lib64png3-1.2.5-10.5.100mdk.amd64.rpm 7f2e23c89e39423b2499798cad32fc13 amd64/10.0/RPMS/lib64png3-devel-1.2.5-10.5.100mdk.amd64.rpm ac6b7e03e3e816efa8744816d596338f amd64/10.0/RPMS/lib64png3-static-devel-1.2.5-10.5.100mdk.amd64.rpm 5402d26cab5f03469f22f10e7279a64f amd64/10.0/SRPMS/libpng-1.2.5-10.5.100mdk.src.rpm Multi Network Firewall 8.2 f8ec19565a938e22f23e39b444d208a2 mnf8.2/RPMS/libpng3-1.2.4-3.7.M82mdk.i586.rpm 99b28bb4446212b3cf099640a876c44e mnf8.2/SRPMS/libpng-1.2.4-3.7.M82mdk.src.rpm Corporate Server 2.1 6cf56378665f973c6b96a487db31f2df corporate/2.1/RPMS/libpng3-1.2.4-3.7.C21mdk.i586.rpm 4dfb84e68f30cc4de1ddf2085ef74ebd corporate/2.1/RPMS/libpng3-devel-1.2.4-3.7.C21mdk.i586.rpm 68adca80324ccf10ecf386466673ff5e corporate/2.1/RPMS/libpng3-static-devel-1.2.4-3.7.C21mdk.i586.rpm e37d6b112471f9fbd39eee11db336a8e corporate/2.1/SRPMS/libpng-1.2.4-3.7.C21mdk.src.rpm Corporate Server 2.1/X86_64 bb2f7ccff93adcf0f466cb4741f09440 x86_64/corporate/2.1/RPMS/libpng3-1.2.4-3.7.C21mdk.x86_64.rpm 22bd27f48fa0fd1e0510c3066ab67325 x86_64/corporate/2.1/RPMS/libpng3-devel-1.2.4-3.7.C21mdk.x86_64.rpm 769bb0aa09bf26b1ff64a9cd5e5a452e x86_64/corporate/2.1/RPMS/libpng3-static-devel-1.2.4-3.7.C21mdk.x86_64.rpm e37d6b112471f9fbd39eee11db336a8e x86_64/corporate/2.1/SRPMS/libpng-1.2.4-3.7.C21mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599 http://www.kb.cert.org/vuls/id/388984 http://www.kb.cert.org/vuls/id/236656 http://www.kb.cert.org/vuls/id/160448 http://www.kb.cert.org/vuls/id/477512 http://www.kb.cert.org/vuls/id/286464 http://www.kb.cert.org/vuls/id/817368 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  23. Mandrakesoft Security Advisories Package name drakxtools Date August 4th, 2004 Advisory ID MDKA-2004:035 Affected versions 10.0 Synopsis Updated drakxtools package corrects various bugs. Problem Description The following bugs have been corrected in the provided update packages: - diskdrake: o fix Compaq Smart Array support o misc bug fixes - drakbackup: o fix Anthill bugs #927 and #929 (filenames with spaces, .backupignore, misc GUI issues) o fix AntHill bugs #1009 and #1010 (DVD recording, disk quota) o fix .backupignore issue o typo in "other" routine - drakboot: fix doble windows on LILO/GRUB error - drakconnect: misc bug fixes - draksplash: make it works again... - drakTermServ: misc fixes - drakupdate_fstab: add support for floppies - drakxtv: fix tv modules that weren't loaded on boot - globetrooter support (a mdk10.0 based product with automatic hw configuration in harddrake service) - harddrake GUI: do not automatically configure removable media but run the proper config tool instead - harddrake service: o fix adding a removable medium o fix misdetection of nvidia nforce ethernet cards (broken since forcedeth replaced nvnet on 2004-01-21 in MDK10's ldetect-lst) o fix logs of newly added hardware o only stop boot progressbar if there a non automatic tool to run o fix duplicated USB disks (in both disk and unknown categories in GUI) - XFdrake: fix monitor detection (based on mandrakemove) Updated Packages Mandrakelinux 10.0 bae842442bc7ce0130ec1c4ce154c8b1 10.0/RPMS/drakxtools-10-34.3.100mdk.i586.rpm d26e8f617f922805763c82d962886371 10.0/RPMS/drakxtools-http-10-34.3.100mdk.i586.rpm 9a5cca4be5d5689de338723cb1f7fe25 10.0/RPMS/drakxtools-newt-10-34.3.100mdk.i586.rpm d950ab157825a3929319a56abcde2655 10.0/RPMS/harddrake-10-34.3.100mdk.i586.rpm 3f14b97aaa87e2a3cfa44579c14cd29f 10.0/RPMS/harddrake-ui-10-34.3.100mdk.i586.rpm 103ab6a5c2c2e3860606d28f5507219e 10.0/SRPMS/drakxtools-10-34.3.100mdk.src.rpm Mandrakelinux 10.0/AMD64 0f3dd5b3bd1082a28018748c80ddee1a amd64/10.0/RPMS/drakxtools-10-34.3.100mdk.amd64.rpm ca5da366347494be108adaddaa458b36 amd64/10.0/RPMS/drakxtools-http-10-34.3.100mdk.amd64.rpm 2b112d8aa95b440661abd38b80ed32e8 amd64/10.0/RPMS/drakxtools-newt-10-34.3.100mdk.amd64.rpm 063be9903cfe6439ae3311a7d9c9841d amd64/10.0/RPMS/harddrake-10-34.3.100mdk.amd64.rpm 5da82298ed35cdc180b57bb630db065f amd64/10.0/RPMS/harddrake-ui-10-34.3.100mdk.amd64.rpm 103ab6a5c2c2e3860606d28f5507219e amd64/10.0/SRPMS/drakxtools-10-34.3.100mdk.src.rpm Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  24. Mandrakesoft Security Advisories Package name rpmdrake Date August 4th, 2004 Advisory ID MDKA-2004:034 Affected versions 10.0 Synopsis Updated rpmdrake packages fix parsing bug Problem Description When rpmdrake would come across a package name containing the string "-h" it would print out the help usage instead of installing or upgrading a package. The updated packages fix this. It is recommended that all users upgrade immediately. Updated Packages Mandrakelinux 10.0 326916728a1a54529bc6e3e36c3a1567 10.0/RPMS/park-rpmdrake-2.1.3-2.4.100mdk.i586.rpm 030cc4a5db99eb5d92f32e0d8d10a708 10.0/RPMS/rpmdrake-2.1.3-2.4.100mdk.i586.rpm 8764796b7b6aaf0155771f9b84f96e95 10.0/SRPMS/rpmdrake-2.1.3-2.4.100mdk.src.rpm Mandrakelinux 10.0/AMD64 3fc42f02aa330e353538e156fc179848 amd64/10.0/RPMS/park-rpmdrake-2.1.3-2.4.100mdk.amd64.rpm f92a8adecd082d1d2af6cf119719c89b amd64/10.0/RPMS/rpmdrake-2.1.3-2.4.100mdk.amd64.rpm 8764796b7b6aaf0155771f9b84f96e95 amd64/10.0/SRPMS/rpmdrake-2.1.3-2.4.100mdk.src.rpm Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
×
×
  • Create New...