Jump to content

mystified

Platinum
  • Posts

    5828
  • Joined

  • Last visited

Everything posted by mystified

  1. Mandrakesoft Security Advisories Package name OpenOffice.org Date July 29th, 2004 Advisory ID MDKSA-2004:078 Affected versions 10.0 Synopsis Updated OpenOffice.org packages fix libneon vulnerability Problem Description The OpenOffice.org office suite contains an internal libneon library which allows it to connect to WebDAV servers. This internal library is subject to the same vulnerabilities that were fixed in libneon recently. These updated packages contain fixes to libneon to correct the several format string vulnerabilities in it, as well as a heap-based buffer overflow vulnerability. Updated Packages Mandrakelinux 10.0 bdd8d8a8b6af463df910a7cde025b734 10.0/RPMS/OpenOffice.org-1.1.2-3.1.100mdk.i586.rpm 51c8887de72b7ac39c85062b35d260e6 10.0/RPMS/OpenOffice.org-help-cs-1.1.2-3.1.100mdk.i586.rpm 1be3655a3870f3a62608df7e864afe9e 10.0/RPMS/OpenOffice.org-help-de-1.1.2-3.1.100mdk.i586.rpm 0e01d4df1bd94eb1937b4875af700056 10.0/RPMS/OpenOffice.org-help-en-1.1.2-3.1.100mdk.i586.rpm 5f00be2536c9e8b3a836275b96ab753b 10.0/RPMS/OpenOffice.org-help-es-1.1.2-3.1.100mdk.i586.rpm e90125b24f99f099704d60018e339b8d 10.0/RPMS/OpenOffice.org-help-eu-1.1.2-3.1.100mdk.i586.rpm 836aec6915d5ceecc20c3e034e19e336 10.0/RPMS/OpenOffice.org-help-fi-1.1.2-3.1.100mdk.i586.rpm 20b5190e2b683783aab65d883468074e 10.0/RPMS/OpenOffice.org-help-fr-1.1.2-3.1.100mdk.i586.rpm 4f7ef1c9b8251e96ce140463eaf28310 10.0/RPMS/OpenOffice.org-help-it-1.1.2-3.1.100mdk.i586.rpm 7b5f6d5701e9f290d34ab7a4ada25fc1 10.0/RPMS/OpenOffice.org-help-ja-1.1.2-3.1.100mdk.i586.rpm d70298c769ce7dd2596d640a0c644cc9 10.0/RPMS/OpenOffice.org-help-ko-1.1.2-3.1.100mdk.i586.rpm ed06265ba967349b8a28420e5ff56ae8 10.0/RPMS/OpenOffice.org-help-nl-1.1.2-3.1.100mdk.i586.rpm b6c34d066a2addb975837dba16ffe9c7 10.0/RPMS/OpenOffice.org-help-ru-1.1.2-3.1.100mdk.i586.rpm c2dfd07ac968d38a0c6c59828f984850 10.0/RPMS/OpenOffice.org-help-sk-1.1.2-3.1.100mdk.i586.rpm 6dbf67fa908bb9a90dfcc0aa7fe43c93 10.0/RPMS/OpenOffice.org-help-sv-1.1.2-3.1.100mdk.i586.rpm 82de991deefe0ed144890b5e107c7c49 10.0/RPMS/OpenOffice.org-help-zh_CN-1.1.2-3.1.100mdk.i586.rpm bd471a407725562c67f7d6b993fe968c 10.0/RPMS/OpenOffice.org-help-zh_TW-1.1.2-3.1.100mdk.i586.rpm 30cbafc38454793497dcace816814589 10.0/RPMS/OpenOffice.org-l10n-ar-1.1.2-3.1.100mdk.i586.rpm 6c1f99a64b23c335d64effc58ace1a66 10.0/RPMS/OpenOffice.org-l10n-ca-1.1.2-3.1.100mdk.i586.rpm f7217fbce4f4fec19c66007bf7f1c8fa 10.0/RPMS/OpenOffice.org-l10n-cs-1.1.2-3.1.100mdk.i586.rpm da66f567a0c95d2551385706b6322511 10.0/RPMS/OpenOffice.org-l10n-da-1.1.2-3.1.100mdk.i586.rpm b25c4a8a5a04dba649dbe07cb74e437c 10.0/RPMS/OpenOffice.org-l10n-de-1.1.2-3.1.100mdk.i586.rpm c9de8265acf394e867f9d37dab8b8e4f 10.0/RPMS/OpenOffice.org-l10n-el-1.1.2-3.1.100mdk.i586.rpm 26d3aec1657864a5af79e6cf42ec575c 10.0/RPMS/OpenOffice.org-l10n-en-1.1.2-3.1.100mdk.i586.rpm 306840e68f1c5554b56fcb5a78d05662 10.0/RPMS/OpenOffice.org-l10n-es-1.1.2-3.1.100mdk.i586.rpm d497f588850259bb25ca2a8bfb46437b 10.0/RPMS/OpenOffice.org-l10n-et-1.1.2-3.1.100mdk.i586.rpm d093a78f33eb0e8e9ff6e10ae6f83b4f 10.0/RPMS/OpenOffice.org-l10n-eu-1.1.2-3.1.100mdk.i586.rpm 092efa049db70abadaa2eb2780d29d13 10.0/RPMS/OpenOffice.org-l10n-fi-1.1.2-3.1.100mdk.i586.rpm e57acc32c3fe720cd5643bb9e1bee835 10.0/RPMS/OpenOffice.org-l10n-fr-1.1.2-3.1.100mdk.i586.rpm 061f19572d6f588b2da57b32954f4960 10.0/RPMS/OpenOffice.org-l10n-it-1.1.2-3.1.100mdk.i586.rpm 7db9ae970b0cd452cb052743172a9985 10.0/RPMS/OpenOffice.org-l10n-ja-1.1.2-3.1.100mdk.i586.rpm 2c39709ba4dbbbdf592d3331c4f9b236 10.0/RPMS/OpenOffice.org-l10n-ko-1.1.2-3.1.100mdk.i586.rpm cecb56a830fa676b1e9e27ece5c39271 10.0/RPMS/OpenOffice.org-l10n-nl-1.1.2-3.1.100mdk.i586.rpm ead058a94cc6f3e86d58aac7235f6782 10.0/RPMS/OpenOffice.org-l10n-pl-1.1.2-3.1.100mdk.i586.rpm e290451530d4bf28cca0977cb0388d18 10.0/RPMS/OpenOffice.org-l10n-pt-1.1.2-3.1.100mdk.i586.rpm c2d58b04563e54556780f387953edc6e 10.0/RPMS/OpenOffice.org-l10n-pt_BR-1.1.2-3.1.100mdk.i586.rpm 1dc89fbb3e79f4f3a41da6665ae9e19b 10.0/RPMS/OpenOffice.org-l10n-ru-1.1.2-3.1.100mdk.i586.rpm 308e28b58b5ee72f84d8fc3c24f4c2dd 10.0/RPMS/OpenOffice.org-l10n-sk-1.1.2-3.1.100mdk.i586.rpm fe1419e7a3b301d28046e6d64d30f724 10.0/RPMS/OpenOffice.org-l10n-sv-1.1.2-3.1.100mdk.i586.rpm 144a6daad887f537fbe1954d8f3de6b2 10.0/RPMS/OpenOffice.org-l10n-tr-1.1.2-3.1.100mdk.i586.rpm ba8e3f3119d89fa4f727f3e8d002cdec 10.0/RPMS/OpenOffice.org-l10n-zh_CN-1.1.2-3.1.100mdk.i586.rpm f43ae55a73eff7fadce5d5fc5ec6523b 10.0/RPMS/OpenOffice.org-l10n-zh_TW-1.1.2-3.1.100mdk.i586.rpm e495846523f861eefe787ae47dd79943 10.0/RPMS/OpenOffice.org-libs-1.1.2-3.1.100mdk.i586.rpm 97ad227fa4a2b76e8cca7c73127c5b7a 10.0/SRPMS/OpenOffice.org-1.1.2-3.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 bdd8d8a8b6af463df910a7cde025b734 amd64/10.0/RPMS/OpenOffice.org-1.1.2-3.1.100mdk.i586.rpm 51c8887de72b7ac39c85062b35d260e6 amd64/10.0/RPMS/OpenOffice.org-help-cs-1.1.2-3.1.100mdk.i586.rpm 1be3655a3870f3a62608df7e864afe9e amd64/10.0/RPMS/OpenOffice.org-help-de-1.1.2-3.1.100mdk.i586.rpm 0e01d4df1bd94eb1937b4875af700056 amd64/10.0/RPMS/OpenOffice.org-help-en-1.1.2-3.1.100mdk.i586.rpm 5f00be2536c9e8b3a836275b96ab753b amd64/10.0/RPMS/OpenOffice.org-help-es-1.1.2-3.1.100mdk.i586.rpm e90125b24f99f099704d60018e339b8d amd64/10.0/RPMS/OpenOffice.org-help-eu-1.1.2-3.1.100mdk.i586.rpm 836aec6915d5ceecc20c3e034e19e336 amd64/10.0/RPMS/OpenOffice.org-help-fi-1.1.2-3.1.100mdk.i586.rpm 20b5190e2b683783aab65d883468074e amd64/10.0/RPMS/OpenOffice.org-help-fr-1.1.2-3.1.100mdk.i586.rpm 4f7ef1c9b8251e96ce140463eaf28310 amd64/10.0/RPMS/OpenOffice.org-help-it-1.1.2-3.1.100mdk.i586.rpm 7b5f6d5701e9f290d34ab7a4ada25fc1 amd64/10.0/RPMS/OpenOffice.org-help-ja-1.1.2-3.1.100mdk.i586.rpm d70298c769ce7dd2596d640a0c644cc9 amd64/10.0/RPMS/OpenOffice.org-help-ko-1.1.2-3.1.100mdk.i586.rpm ed06265ba967349b8a28420e5ff56ae8 amd64/10.0/RPMS/OpenOffice.org-help-nl-1.1.2-3.1.100mdk.i586.rpm b6c34d066a2addb975837dba16ffe9c7 amd64/10.0/RPMS/OpenOffice.org-help-ru-1.1.2-3.1.100mdk.i586.rpm c2dfd07ac968d38a0c6c59828f984850 amd64/10.0/RPMS/OpenOffice.org-help-sk-1.1.2-3.1.100mdk.i586.rpm 6dbf67fa908bb9a90dfcc0aa7fe43c93 amd64/10.0/RPMS/OpenOffice.org-help-sv-1.1.2-3.1.100mdk.i586.rpm 82de991deefe0ed144890b5e107c7c49 amd64/10.0/RPMS/OpenOffice.org-help-zh_CN-1.1.2-3.1.100mdk.i586.rpm bd471a407725562c67f7d6b993fe968c amd64/10.0/RPMS/OpenOffice.org-help-zh_TW-1.1.2-3.1.100mdk.i586.rpm 30cbafc38454793497dcace816814589 amd64/10.0/RPMS/OpenOffice.org-l10n-ar-1.1.2-3.1.100mdk.i586.rpm 6c1f99a64b23c335d64effc58ace1a66 amd64/10.0/RPMS/OpenOffice.org-l10n-ca-1.1.2-3.1.100mdk.i586.rpm f7217fbce4f4fec19c66007bf7f1c8fa amd64/10.0/RPMS/OpenOffice.org-l10n-cs-1.1.2-3.1.100mdk.i586.rpm da66f567a0c95d2551385706b6322511 amd64/10.0/RPMS/OpenOffice.org-l10n-da-1.1.2-3.1.100mdk.i586.rpm b25c4a8a5a04dba649dbe07cb74e437c amd64/10.0/RPMS/OpenOffice.org-l10n-de-1.1.2-3.1.100mdk.i586.rpm c9de8265acf394e867f9d37dab8b8e4f amd64/10.0/RPMS/OpenOffice.org-l10n-el-1.1.2-3.1.100mdk.i586.rpm 26d3aec1657864a5af79e6cf42ec575c amd64/10.0/RPMS/OpenOffice.org-l10n-en-1.1.2-3.1.100mdk.i586.rpm 306840e68f1c5554b56fcb5a78d05662 amd64/10.0/RPMS/OpenOffice.org-l10n-es-1.1.2-3.1.100mdk.i586.rpm d497f588850259bb25ca2a8bfb46437b amd64/10.0/RPMS/OpenOffice.org-l10n-et-1.1.2-3.1.100mdk.i586.rpm d093a78f33eb0e8e9ff6e10ae6f83b4f amd64/10.0/RPMS/OpenOffice.org-l10n-eu-1.1.2-3.1.100mdk.i586.rpm 092efa049db70abadaa2eb2780d29d13 amd64/10.0/RPMS/OpenOffice.org-l10n-fi-1.1.2-3.1.100mdk.i586.rpm e57acc32c3fe720cd5643bb9e1bee835 amd64/10.0/RPMS/OpenOffice.org-l10n-fr-1.1.2-3.1.100mdk.i586.rpm 061f19572d6f588b2da57b32954f4960 amd64/10.0/RPMS/OpenOffice.org-l10n-it-1.1.2-3.1.100mdk.i586.rpm 7db9ae970b0cd452cb052743172a9985 amd64/10.0/RPMS/OpenOffice.org-l10n-ja-1.1.2-3.1.100mdk.i586.rpm 2c39709ba4dbbbdf592d3331c4f9b236 amd64/10.0/RPMS/OpenOffice.org-l10n-ko-1.1.2-3.1.100mdk.i586.rpm cecb56a830fa676b1e9e27ece5c39271 amd64/10.0/RPMS/OpenOffice.org-l10n-nl-1.1.2-3.1.100mdk.i586.rpm ead058a94cc6f3e86d58aac7235f6782 amd64/10.0/RPMS/OpenOffice.org-l10n-pl-1.1.2-3.1.100mdk.i586.rpm e290451530d4bf28cca0977cb0388d18 amd64/10.0/RPMS/OpenOffice.org-l10n-pt-1.1.2-3.1.100mdk.i586.rpm c2d58b04563e54556780f387953edc6e amd64/10.0/RPMS/OpenOffice.org-l10n-pt_BR-1.1.2-3.1.100mdk.i586.rpm 1dc89fbb3e79f4f3a41da6665ae9e19b amd64/10.0/RPMS/OpenOffice.org-l10n-ru-1.1.2-3.1.100mdk.i586.rpm 308e28b58b5ee72f84d8fc3c24f4c2dd amd64/10.0/RPMS/OpenOffice.org-l10n-sk-1.1.2-3.1.100mdk.i586.rpm fe1419e7a3b301d28046e6d64d30f724 amd64/10.0/RPMS/OpenOffice.org-l10n-sv-1.1.2-3.1.100mdk.i586.rpm 144a6daad887f537fbe1954d8f3de6b2 amd64/10.0/RPMS/OpenOffice.org-l10n-tr-1.1.2-3.1.100mdk.i586.rpm ba8e3f3119d89fa4f727f3e8d002cdec amd64/10.0/RPMS/OpenOffice.org-l10n-zh_CN-1.1.2-3.1.100mdk.i586.rpm f43ae55a73eff7fadce5d5fc5ec6523b amd64/10.0/RPMS/OpenOffice.org-l10n-zh_TW-1.1.2-3.1.100mdk.i586.rpm e495846523f861eefe787ae47dd79943 amd64/10.0/RPMS/OpenOffice.org-libs-1.1.2-3.1.100mdk.i586.rpm 97ad227fa4a2b76e8cca7c73127c5b7a amd64/10.0/SRPMS/OpenOffice.org-1.1.2-3.1.100mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  2. Mandrakesoft Security Advisories Package name wv Date July 29th, 2004 Advisory ID MDKSA-2004:077 Affected versions 9.2, 10.0 Synopsis Updated wv packages fix vulnerability Problem Description iDefense discovered a buffer overflow vulnerability in the wv package which could allow an attacker to execute arbitrary code with the privileges of the user running the vulnerable application. The updated packages are patched to protect against this problem. Updated Packages Mandrakelinux 9.2 dcf67ddd72cc96ea526d4189dce93edb 9.2/RPMS/libwv-1.0_0-1.0.0-1.1.92mdk.i586.rpm d9c0629e2c8921a93290aede1b5158f9 9.2/RPMS/libwv-1.0_0-devel-1.0.0-1.1.92mdk.i586.rpm fa6f235b5934c40af8cb087394bcdefc 9.2/RPMS/wv-1.0.0-1.1.92mdk.i586.rpm ef345c688ddb57bdbadba00a5b924c79 9.2/SRPMS/wv-1.0.0-1.1.92mdk.src.rpm Mandrakelinux 9.2/AMD64 a23f13d265c1916c45c514798a37aaad amd64/9.2/RPMS/lib64wv-1.0_0-1.0.0-1.1.92mdk.amd64.rpm 9ca5b4da978fb5c7908cd52018f6e191 amd64/9.2/RPMS/lib64wv-1.0_0-devel-1.0.0-1.1.92mdk.amd64.rpm 568e4b5933ceed44a7c7b30dfff15f80 amd64/9.2/RPMS/wv-1.0.0-1.1.92mdk.amd64.rpm ef345c688ddb57bdbadba00a5b924c79 amd64/9.2/SRPMS/wv-1.0.0-1.1.92mdk.src.rpm Mandrakelinux 10.0 7bc8b712dbb5ca6592de05341b6d1489 10.0/RPMS/libwv-1.0_0-1.0.0-1.1.100mdk.i586.rpm bec8e09ab3be99e622bd62cf6c0cf3df 10.0/RPMS/libwv-1.0_0-devel-1.0.0-1.1.100mdk.i586.rpm e9795464f2baa0bb36ea2f15d7e420c6 10.0/RPMS/wv-1.0.0-1.1.100mdk.i586.rpm 10a630945f35b4a90f36a6270d98d241 10.0/SRPMS/wv-1.0.0-1.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 e3072c5942b032b547b04dd10a442826 amd64/10.0/RPMS/lib64wv-1.0_0-1.0.0-1.1.100mdk.amd64.rpm 8b369ac8db42130442c003cb7229a7d1 amd64/10.0/RPMS/lib64wv-1.0_0-devel-1.0.0-1.1.100mdk.amd64.rpm 98c5fa468e3815501058461213bb7da7 amd64/10.0/RPMS/wv-1.0.0-1.1.100mdk.amd64.rpm 10a630945f35b4a90f36a6270d98d241 amd64/10.0/SRPMS/wv-1.0.0-1.1.100mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0645 http://www.idefense.com/application/poi/di...lashstatus=true Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  3. Mandrakesoft Security Advisories Package name libneon Date July 29th, 2004 Advisory ID MDKA-2004:033 Affected versions 9.2, 10.0 Synopsis Updated libneon packages fix issues with the compression interface Problem Description Compression interface fixes: - fix issues handling content decoding and request retries from authentication challenges (Justin Erenkrantz) - fix places where reader callback would receive spurious size=0 calls - fix to pass user-supplied userdata to user-supplied acceptance callback The updated packages fix the problems. Updated Packages Mandrakelinux 9.2 c5aae1e16f683fb91ecb08742ce5e01c 9.2/RPMS/libneon0.24-0.24.7-1.1.92mdk.i586.rpm d78bb001c89731e5b411ee61e8f4665c 9.2/RPMS/libneon0.24-devel-0.24.7-1.1.92mdk.i586.rpm 6b83bcd8c4636c2f0e4a3898a8baecd2 9.2/RPMS/libneon0.24-static-devel-0.24.7-1.1.92mdk.i586.rpm 616cc1359b1eda1201103242843460bf 9.2/SRPMS/libneon-0.24.7-1.1.92mdk.src.rpm Mandrakelinux 9.2/AMD64 51b582370b1f7cee78de1aaac5d80e23 amd64/9.2/RPMS/lib64neon0.24-0.24.7-1.1.92mdk.amd64.rpm 9562379e1dd3776b74f512ab93522bc4 amd64/9.2/RPMS/lib64neon0.24-devel-0.24.7-1.1.92mdk.amd64.rpm 55a12083331b93537e6378c9b9177af8 amd64/9.2/RPMS/lib64neon0.24-static-devel-0.24.7-1.1.92mdk.amd64.rpm 616cc1359b1eda1201103242843460bf amd64/9.2/SRPMS/libneon-0.24.7-1.1.92mdk.src.rpm Mandrakelinux 10.0 0e728d83090efbc86c8269650d40dcaf 10.0/RPMS/libneon0.24-0.24.7-1.1.100mdk.i586.rpm cb92555e00921373250e2660afba062d 10.0/RPMS/libneon0.24-devel-0.24.7-1.1.100mdk.i586.rpm 301716fb405281b4e4a309d64146c1d8 10.0/RPMS/libneon0.24-static-devel-0.24.7-1.1.100mdk.i586.rpm 02a701d06ccc6f63dadb734b79efe5c1 10.0/SRPMS/libneon-0.24.7-1.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 6926604329e7a281aed39ce22e63464a amd64/10.0/RPMS/lib64neon0.24-0.24.7-1.1.100mdk.amd64.rpm 3ff841a2867aa0fc218665255dc79115 amd64/10.0/RPMS/lib64neon0.24-devel-0.24.7-1.1.100mdk.amd64.rpm ac0853a991686d8feb3b00ae7ff15644 amd64/10.0/RPMS/lib64neon0.24-static-devel-0.24.7-1.1.100mdk.amd64.rpm 02a701d06ccc6f63dadb734b79efe5c1 amd64/10.0/SRPMS/libneon-0.24.7-1.1.100mdk.src.rpm Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  4. Mandrakesoft Security Advisories Package name sox Date July 28th, 2004 Advisory ID MDKSA-2004:076 Affected versions 9.1, 9.2, 10.0, CS2.1 Synopsis Updated sox packages fix buffer overflows with malicious .wav files Problem Description Ulf Harnhammar discovered two buffer overflows in SoX. They occur when the sox or play commands handle malicious .WAV files. Versions 12.17.4, 12.17.3 and 12.17.2 are vulnerable to these overflows. 12.17.1, 12.17 and 12.16 are some versions that are not. Updated Packages Mandrakelinux 9.1 04a2fb8423f6254396706e2a523d82a8 9.1/RPMS/sox-12.17.3-4.1.91mdk.i586.rpm afb2debaa5f138e370bed3d8f087812d 9.1/RPMS/sox-devel-12.17.3-4.1.91mdk.i586.rpm 8bdb6c32793c21a74cd94c438e3aaf7f 9.1/SRPMS/sox-12.17.3-4.1.91mdk.src.rpm Mandrakelinux 9.1/PPC 883c5d95da0a072a2a038c6201f8854d ppc/9.1/RPMS/sox-12.17.3-4.1.91mdk.ppc.rpm 9ff77c03e14bc9ac29ffc6991ed1a83e ppc/9.1/RPMS/sox-devel-12.17.3-4.1.91mdk.ppc.rpm 8bdb6c32793c21a74cd94c438e3aaf7f ppc/9.1/SRPMS/sox-12.17.3-4.1.91mdk.src.rpm Mandrakelinux 9.2 6f811f182c2923fb517b20c2667d4ab6 9.2/RPMS/sox-12.17.4-2.1.92mdk.i586.rpm 98d8e01d6ffda65fec1e4e46841fad65 9.2/RPMS/sox-devel-12.17.4-2.1.92mdk.i586.rpm 55839484abe30bffc0ba7e691200255c 9.2/SRPMS/sox-12.17.4-2.1.92mdk.src.rpm Mandrakelinux 9.2/AMD64 3fccdc8f27702e8c57a2bc668a076fb9 amd64/9.2/RPMS/sox-12.17.4-2.1.92mdk.amd64.rpm 806e66baec66c30fdf44cb9fef5fe5aa amd64/9.2/RPMS/sox-devel-12.17.4-2.1.92mdk.amd64.rpm 55839484abe30bffc0ba7e691200255c amd64/9.2/SRPMS/sox-12.17.4-2.1.92mdk.src.rpm Mandrakelinux 10.0 e9af6419ba4828105f9998c1460c1441 10.0/RPMS/sox-12.17.4-2.1.100mdk.i586.rpm ac76f459e728acf298de4cbaa9c71dc1 10.0/RPMS/sox-devel-12.17.4-2.1.100mdk.i586.rpm f503ca03a533958bc486eefe90ba659a 10.0/SRPMS/sox-12.17.4-2.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 3a290097351c4185c3f9af3eb0f1be6e amd64/10.0/RPMS/sox-12.17.4-2.1.100mdk.amd64.rpm f29d5567a8dacf0d7d2f63a78a8636cd amd64/10.0/RPMS/sox-devel-12.17.4-2.1.100mdk.amd64.rpm f503ca03a533958bc486eefe90ba659a amd64/10.0/SRPMS/sox-12.17.4-2.1.100mdk.src.rpm Corporate Server 2.1 cb593308ec310bbc30ef098d424eba55 corporate/2.1/RPMS/sox-12.17.3-4.1.C21mdk.i586.rpm 1a7fe5488a0f4fa9df8b7258efa13d6a corporate/2.1/RPMS/sox-devel-12.17.3-4.1.C21mdk.i586.rpm ab3c0035a1e15a47186da84aa0b4da44 corporate/2.1/SRPMS/sox-12.17.3-4.1.C21mdk.src.rpm Corporate Server 2.1/X86_64 048b6f8c46ac25422a77e78b1d17ac5b x86_64/corporate/2.1/RPMS/sox-12.17.3-4.1.C21mdk.x86_64.rpm 97de40304699f28bb13914ff92024535 x86_64/corporate/2.1/RPMS/sox-devel-12.17.3-4.1.C21mdk.x86_64.rpm ab3c0035a1e15a47186da84aa0b4da44 x86_64/corporate/2.1/SRPMS/sox-12.17.3-4.1.C21mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  5. Mandrakesoft Security Advisories Package name mod_ssl Date July 27th, 2004 Advisory ID MDKSA-2004:075 Affected versions 9.1, 9.2, 10.0, MNF8.2, CS2.1 Synopsis Updated mod_ssl packages fix potential vulnerabilities Problem Description Ralf S. Engelschall found a remaining risky call to ssl_log while reviewing code for another issue reported by Virulent. The updated packages are patched to correct the problem. Updated Packages Mandrakelinux 9.1 e58304a3bbc0581e643e5609e95b8230 9.1/RPMS/mod_ssl-2.8.12-8.2.91mdk.i586.rpm c752c0ae8d6d034eb61c1a967e0e50f0 9.1/SRPMS/mod_ssl-2.8.12-8.2.91mdk.src.rpm Mandrakelinux 9.1/PPC c3ad8be79ca34e4a08d9d50d8c0e2178 ppc/9.1/RPMS/mod_ssl-2.8.12-8.2.91mdk.ppc.rpm c752c0ae8d6d034eb61c1a967e0e50f0 ppc/9.1/SRPMS/mod_ssl-2.8.12-8.2.91mdk.src.rpm Mandrakelinux 9.2 51a525a5e2da3af2812d6f502dcb55ea 9.2/RPMS/mod_ssl-2.8.15-1.2.92mdk.i586.rpm faf4f30d6757b581b407e6dc645e17c0 9.2/SRPMS/mod_ssl-2.8.15-1.2.92mdk.src.rpm Mandrakelinux 9.2/AMD64 daf5b6b738aa5010619fc2cdf8817112 amd64/9.2/RPMS/mod_ssl-2.8.15-1.2.92mdk.amd64.rpm faf4f30d6757b581b407e6dc645e17c0 amd64/9.2/SRPMS/mod_ssl-2.8.15-1.2.92mdk.src.rpm Mandrakelinux 10.0 67b5f2830144f4f23252c6e790024913 10.0/RPMS/mod_ssl-2.8.16-1.2.100mdk.i586.rpm bc3d01ea44136b134f465f9477f4907c 10.0/SRPMS/mod_ssl-2.8.16-1.2.100mdk.src.rpm Mandrakelinux 10.0/AMD64 0e20fd551d0db86fb01bf1cac1fc0d00 amd64/10.0/RPMS/mod_ssl-2.8.16-1.2.100mdk.amd64.rpm bc3d01ea44136b134f465f9477f4907c amd64/10.0/SRPMS/mod_ssl-2.8.16-1.2.100mdk.src.rpm Multi Network Firewall 8.2 03dd0105896ff42ed4cd1fe48d3f62d7 mnf8.2/RPMS/mod_ssl-2.8.7-3.4.M82mdk.i586.rpm 7c306e82940c73410ccf8e9bb635adea mnf8.2/SRPMS/mod_ssl-2.8.7-3.4.M82mdk.src.rpm Corporate Server 2.1 ced0b61893293095a5f229728e4cbdb2 corporate/2.1/RPMS/mod_ssl-2.8.10-5.4.C21mdk.i586.rpm 543976686dac61408092c2d90faf45be corporate/2.1/SRPMS/mod_ssl-2.8.10-5.4.C21mdk.src.rpm Corporate Server 2.1/X86_64 200c8254e7bbd46c8f9d5288803d33a1 x86_64/corporate/2.1/RPMS/mod_ssl-2.8.10-5.4.C21mdk.x86_64.rpm 543976686dac61408092c2d90faf45be x86_64/corporate/2.1/SRPMS/mod_ssl-2.8.10-5.4.C21mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0700 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  6. Mandrakesoft Security Advisories Package name webmin Date July 27th, 2004 Advisory ID MDKSA-2004:074 Affected versions 9.1, 9.2, 10.0, CS2.1 Synopsis Updated webmin packages correct remote attacker vulnerabilities Problem Description Unknown vulnerability in Webmin 1.140 allows remote attackers to bypass access control rules and gain read access to configuration information for a module. (CAN-2004-0582) The account lockout functionality in Webmin 1.140 does not parse certain character strings, which allows remote attackers to conduct a brute force attack to guess user IDs and passwords. (CAN-2004-0583) The updated packages are patched to correct the problem. Updated Packages Mandrakelinux 9.1 a9bbe302fe2931b8dc1d6ba4a98628c8 9.1/RPMS/webmin-1.070-1.1.91mdk.noarch.rpm afc83f59d85baba2b54e4e37c5e0f7fe 9.1/SRPMS/webmin-1.070-1.1.91mdk.src.rpm Mandrakelinux 9.1/PPC 02928c759998ad48dcf15bf42b025c3f ppc/9.1/RPMS/webmin-1.070-1.1.91mdk.noarch.rpm afc83f59d85baba2b54e4e37c5e0f7fe ppc/9.1/SRPMS/webmin-1.070-1.1.91mdk.src.rpm Mandrakelinux 9.2 fb53296da836a7e60133ec52ce16be7f 9.2/RPMS/webmin-1.100-3.1.92mdk.noarch.rpm 1199a752674c1c5ba2b10f0467a8fc3f 9.2/SRPMS/webmin-1.100-3.1.92mdk.src.rpm Mandrakelinux 9.2/AMD64 e2a51d9f29d2b1d9bdfc43e659fc5e62 amd64/9.2/RPMS/webmin-1.100-3.1.92mdk.noarch.rpm 1199a752674c1c5ba2b10f0467a8fc3f amd64/9.2/SRPMS/webmin-1.100-3.1.92mdk.src.rpm Mandrakelinux 10.0 4fe37cfc98af3ca32ffb6e29efc3cc58 10.0/RPMS/webmin-1.121-4.1.100mdk.noarch.rpm 17f6d0e32710edeb5326320a18475d28 10.0/SRPMS/webmin-1.121-4.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 fba3d5ccb5b63170e9196f4a46744544 amd64/10.0/RPMS/webmin-1.121-4.1.100mdk.noarch.rpm 17f6d0e32710edeb5326320a18475d28 amd64/10.0/SRPMS/webmin-1.121-4.1.100mdk.src.rpm Corporate Server 2.1 650bd74be9292e4e4019983607d25d36 corporate/2.1/RPMS/webmin-0.990-6.3.C21mdk.noarch.rpm 588ab8bcb01be6972982d44a2bcfafbc corporate/2.1/SRPMS/webmin-0.990-6.3.C21mdk.src.rpm Corporate Server 2.1/X86_64 1d30a6a756677c747bf75a0ad052ab2f x86_64/corporate/2.1/RPMS/webmin-0.990-6.3.C21mdk.noarch.rpm 588ab8bcb01be6972982d44a2bcfafbc x86_64/corporate/2.1/SRPMS/webmin-0.990-6.3.C21mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0582 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0583 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  7. Mandrakesoft Security Advisories Package name XFree86 Date July 27th, 2004 Advisory ID MDKSA-2004:073 Affected versions 10.0 Synopsis Updated XFree86 packages fix issue with xdm opening random sockets Problem Description Steve Rumble discovered XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote attackers to connect to the port, in violation of the intended restrictions. The updated packages are patched to correct the problem. Updated Packages Mandrakelinux 10.0 3d8f7cc32efa365598c0eab6362afcd0 10.0/RPMS/X11R6-contrib-4.3-32.1.100mdk.i586.rpm b4172fffca6936486827260143583beb 10.0/RPMS/XFree86-100dpi-fonts-4.3-32.1.100mdk.i586.rpm 76e708133439aa6a251945b3d272efd7 10.0/RPMS/XFree86-4.3-32.1.100mdk.i586.rpm 883614a82021c8f630e05dc836e73735 10.0/RPMS/XFree86-75dpi-fonts-4.3-32.1.100mdk.i586.rpm 860343cbb4f8987aba1b51244509e3ca 10.0/RPMS/XFree86-Xnest-4.3-32.1.100mdk.i586.rpm 83fdeaa5626d268b3b5c79f2c9e9c9da 10.0/RPMS/XFree86-Xvfb-4.3-32.1.100mdk.i586.rpm ee27e16339c3fe869115612f878b6f9a 10.0/RPMS/XFree86-cyrillic-fonts-4.3-32.1.100mdk.i586.rpm 280be6f30a08df7d9df6b14a95bac395 10.0/RPMS/XFree86-doc-4.3-32.1.100mdk.i586.rpm e80cfe469c9815ecf22b9075abc9903b 10.0/RPMS/XFree86-glide-module-4.3-32.1.100mdk.i586.rpm fda7bdf5de0baedb92da3b0d4a3ce6f2 10.0/RPMS/XFree86-server-4.3-32.1.100mdk.i586.rpm 7e69712264c38cdc67bbcde303f24386 10.0/RPMS/XFree86-xfs-4.3-32.1.100mdk.i586.rpm e771f892d01a646f35098241a93fbd58 10.0/RPMS/libxfree86-4.3-32.1.100mdk.i586.rpm 418d499c3c469dcfdfafb08d7549b560 10.0/RPMS/libxfree86-devel-4.3-32.1.100mdk.i586.rpm 19b713df27c5f9c739db32bf23b556c8 10.0/RPMS/libxfree86-static-devel-4.3-32.1.100mdk.i586.rpm acbd5f8c90422416215df5d2fa686f88 10.0/SRPMS/XFree86-4.3-32.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 70773e362c8de210f9da4dc4693d1812 amd64/10.0/RPMS/X11R6-contrib-4.3-32.1.100mdk.amd64.rpm c74d80d2e64aef5a408b62c3512205c1 amd64/10.0/RPMS/XFree86-100dpi-fonts-4.3-32.1.100mdk.amd64.rpm dcb88ecdc48de0577af670c5af9609ac amd64/10.0/RPMS/XFree86-4.3-32.1.100mdk.amd64.rpm d603e47eaf801b471bb68c308920bc48 amd64/10.0/RPMS/XFree86-75dpi-fonts-4.3-32.1.100mdk.amd64.rpm dfdee3789f1963dc7b9d2b7b52a93a0f amd64/10.0/RPMS/XFree86-Xnest-4.3-32.1.100mdk.amd64.rpm 3cca29110317b32fba9f5825ed00867f amd64/10.0/RPMS/XFree86-Xvfb-4.3-32.1.100mdk.amd64.rpm 32963c84575ca591d8945a8418a7f362 amd64/10.0/RPMS/XFree86-cyrillic-fonts-4.3-32.1.100mdk.amd64.rpm c8f3c91b813703d57611087249eabc0d amd64/10.0/RPMS/XFree86-doc-4.3-32.1.100mdk.amd64.rpm 3eafba88d255666197aea3a62e276b61 amd64/10.0/RPMS/XFree86-server-4.3-32.1.100mdk.amd64.rpm 18a8c7471ccb535a49322e4fe334f933 amd64/10.0/RPMS/XFree86-xfs-4.3-32.1.100mdk.amd64.rpm fd24efdfcce22c9fdeb27301f06ced49 amd64/10.0/RPMS/lib64xfree86-4.3-32.1.100mdk.amd64.rpm 9b67ee689be268c4386fde4e81f3a2e3 amd64/10.0/RPMS/lib64xfree86-devel-4.3-32.1.100mdk.amd64.rpm 4fd3a12d07c268d20a3bc80172b616fb amd64/10.0/RPMS/lib64xfree86-static-devel-4.3-32.1.100mdk.amd64.rpm acbd5f8c90422416215df5d2fa686f88 amd64/10.0/SRPMS/XFree86-4.3-32.1.100mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0419 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  8. I think this is going a bit overboard on chastising someone for a comment. Most of this thread was offtopic and probably not very helpful. I don't think this kind of behavior is reflective of the kind of community we're supposed to be. Thread locked.
  9. Thanks so much paul! :D The only bad news is that when we upgrade to final it'll probably have to be done all over again. :o
  10. I only see one in the css and it's display:inline And no, I have not counted the lines of css. :D
  11. I have validated the xhtml and it's all good (thanks tyme for helping me with that last error). But I cannot get the css to validate. Errors URI : http://www.mandrakeusers.org Line: 787 Invalid number : displayshow is not a display value : show Line: 822 Invalid number : displayshow is not a display value : show Line: 893 Invalid number : displayshow is not a display value : show Line: 958 Invalid number : displayshow is not a display value : show Line: 992 Invalid number : displayshow is not a display value : show I have no clue what this means. Can anyone help? Thanks!
  12. mystified

    Eterm

    Great job Luis. Very well written and very thorough. Keep up the good work! :)
  13. We're still trying to figure out why thumbnails aren't working. And I have to own up to the fact that it's my fault that the thread was accidentally deleted. That's what happens when it's late and you're tired. I meant to delete a test post and deleted the thread instead. :o
  14. problem solved by tyme. I had to edit /etc/modprobe.conf and make eth0 load the drivers for my wireless card. Thanks tyme!
  15. I have Mandrake 9.2 installed on another computer. I use a wireless network. Everytime the computer is restarted eth0 fails at boot and the only way I know how to get it working is using the evil internet connection wizard. I'd like a permanent solution to the problem. Any ideas?
  16. Mandrakesoft Security Advisories Package name samba Date July 22nd, 2004 Advisory ID MDKSA-2004:071 Affected versions 9.1, 9.2, 10.0, MNF8.2, CS2.1 Synopsis Updated samba packages fix vulnerability in SWAT, samba-server. Problem Description A vulnerability was discovered in SWAT, the Samba Web Administration Tool. The routine used to decode the base64 data during HTTP basic authentication is subject to a buffer overrun caused by an invalid base64 character. This same code is also used to internally decode the sambaMungedDial attribute value when using the ldapsam passdb backend, and to decode input given to the ntlm_auth tool. This vulnerability only exists in Samba versions 3.0.2 or later; the 3.0.5 release fixes the vulnerability. Systems using SWAT, the ldapsam passdb backend, and tose running winbindd and allowing third- party applications to issue authentication requests via ntlm_auth tool should upgrade immediately. (CAN-2004-0600) A buffer overrun has been located in the code used to support the 'mangling method = hash' smb.conf option. Please be aware that the default setting for this parameter is 'mangling method = hash2' and therefore not vulnerable. This bug is present in Samba 3.0.0 and later, as well as Samba 2.2.X (CAN-2004-0686) This update also fixes a bug where attempting to print in some cases would cause smbd to exit with a signal 11. Updated Packages Mandrakelinux 9.1 379a81194ac29a44ed5413f504b3f9c6 9.1/RPMS/nss_wins-2.2.7a-9.4.91mdk.i586.rpm 0d8bbc2ff31eb4759171066f87d586ec 9.1/RPMS/samba-client-2.2.7a-9.4.91mdk.i586.rpm b2699829ae743ca3a3d8c7af7f2287d0 9.1/RPMS/samba-common-2.2.7a-9.4.91mdk.i586.rpm edcb7e669f0b7fc25a23909add4eeb84 9.1/RPMS/samba-doc-2.2.7a-9.4.91mdk.i586.rpm dff7e002231035a7bb9c1d6cea97e9b5 9.1/RPMS/samba-server-2.2.7a-9.4.91mdk.i586.rpm 31ac013951ba5e625184a13532208666 9.1/RPMS/samba-swat-2.2.7a-9.4.91mdk.i586.rpm 2ba7a3214babff3bd3294ffd72d023a1 9.1/RPMS/samba-winbind-2.2.7a-9.4.91mdk.i586.rpm 127103f4f0b34572507ef4c94bb7356e 9.1/SRPMS/samba-2.2.7a-9.4.91mdk.src.rpm Mandrakelinux 9.1/PPC d7d1301be1efededc96cb6b1793a8fab ppc/9.1/RPMS/nss_wins-2.2.7a-9.4.91mdk.ppc.rpm 95b7a0ac457b26b72349242b626dc04f ppc/9.1/RPMS/samba-client-2.2.7a-9.4.91mdk.ppc.rpm 2261c5a2b3260ad8352feba778f5e826 ppc/9.1/RPMS/samba-common-2.2.7a-9.4.91mdk.ppc.rpm 3e7b43389cb32844862513726aee3ae2 ppc/9.1/RPMS/samba-doc-2.2.7a-9.4.91mdk.ppc.rpm 326b16a7121fdbe3d16aa33862de8d45 ppc/9.1/RPMS/samba-server-2.2.7a-9.4.91mdk.ppc.rpm 4bdb189ad68d5b9eeab6da7b581295ce ppc/9.1/RPMS/samba-swat-2.2.7a-9.4.91mdk.ppc.rpm 1abeacc0d08792e4e38a9ed22c9a0ebe ppc/9.1/RPMS/samba-winbind-2.2.7a-9.4.91mdk.ppc.rpm 127103f4f0b34572507ef4c94bb7356e ppc/9.1/SRPMS/samba-2.2.7a-9.4.91mdk.src.rpm Mandrakelinux 9.2 9bb1f0e25ed2389657501283bf52c054 9.2/RPMS/libsmbclient0-2.2.8a-13.2.92mdk.i586.rpm eec1734ea897176812921f443fe69d61 9.2/RPMS/libsmbclient0-devel-2.2.8a-13.2.92mdk.i586.rpm 1d179c626717703f6a49a9fd20894dcb 9.2/RPMS/libsmbclient0-static-devel-2.2.8a-13.2.92mdk.i586.rpm e12cfed3fe15749d43857b8aafe31b02 9.2/RPMS/nss_wins-2.2.8a-13.2.92mdk.i586.rpm f0cd976a453e8b23f0ef9c2c135fc5d7 9.2/RPMS/samba-client-2.2.8a-13.2.92mdk.i586.rpm 8475ca3829dc64ceea8f01abdcade21c 9.2/RPMS/samba-common-2.2.8a-13.2.92mdk.i586.rpm 9fc072548adc6bdd4d30dc9712a78c20 9.2/RPMS/samba-debug-2.2.8a-13.2.92mdk.i586.rpm cd67210e062a76a83249bf8b55741d1e 9.2/RPMS/samba-doc-2.2.8a-13.2.92mdk.i586.rpm 8f0abb6bc0a82843c5b448c86bb91165 9.2/RPMS/samba-server-2.2.8a-13.2.92mdk.i586.rpm 61c3cfb487802d83d3590f2a1e9d3e23 9.2/RPMS/samba-swat-2.2.8a-13.2.92mdk.i586.rpm f2f768247a5739b1bff40f2ec691b987 9.2/RPMS/samba-winbind-2.2.8a-13.2.92mdk.i586.rpm 783d6e588fdc85cfb3ba985b2d6abc9e 9.2/SRPMS/samba-2.2.8a-13.2.92mdk.src.rpm Mandrakelinux 9.2/AMD64 2352a24ec2b246314b184825cbe63852 amd64/9.2/RPMS/nss_wins-2.2.8a-13.2.92mdk.amd64.rpm 9d06697503f19e780963c5084d826f26 amd64/9.2/RPMS/samba-client-2.2.8a-13.2.92mdk.amd64.rpm 0c3b8f01c1aa411a72cffa24e0e3a321 amd64/9.2/RPMS/samba-common-2.2.8a-13.2.92mdk.amd64.rpm 056c03f2f44fca64ace44c791f8033d9 amd64/9.2/RPMS/samba-debug-2.2.8a-13.2.92mdk.amd64.rpm e241a63aa9b72f636fd40227bdb6ed84 amd64/9.2/RPMS/samba-doc-2.2.8a-13.2.92mdk.amd64.rpm 5c5cf771ce52300c3908a751ab2a0851 amd64/9.2/RPMS/samba-server-2.2.8a-13.2.92mdk.amd64.rpm fdc494fde0bf4a1562c9b78e2305792d amd64/9.2/RPMS/samba-swat-2.2.8a-13.2.92mdk.amd64.rpm 64abc0d71c0971febc1202bd47b57496 amd64/9.2/RPMS/samba-winbind-2.2.8a-13.2.92mdk.amd64.rpm 783d6e588fdc85cfb3ba985b2d6abc9e amd64/9.2/SRPMS/samba-2.2.8a-13.2.92mdk.src.rpm Mandrakelinux 10.0 3dc64ca8fe0f7b0aa51a2c84dc514592 10.0/RPMS/libsmbclient0-3.0.2a-3.2.100mdk.i586.rpm 779356b9c230eb85ce37f315232cdc95 10.0/RPMS/libsmbclient0-devel-3.0.2a-3.2.100mdk.i586.rpm bb4d71ecdefacd3dddddc3688a5eaad5 10.0/RPMS/libsmbclient0-static-devel-3.0.2a-3.2.100mdk.i586.rpm 74df83eb93096ffb23165dbbd28d2011 10.0/RPMS/nss_wins-3.0.2a-3.2.100mdk.i586.rpm 02c7352e5e845c2a3e38d7e321bcbd4b 10.0/RPMS/samba-client-3.0.2a-3.2.100mdk.i586.rpm 28e209b5899bd01b8d39f4dec3677424 10.0/RPMS/samba-common-3.0.2a-3.2.100mdk.i586.rpm 6c5bcd82b4544fe8ddb1e0d70bacfcec 10.0/RPMS/samba-doc-3.0.2a-3.2.100mdk.i586.rpm 43bf0b8c550df90bbe7aee619c5f27b6 10.0/RPMS/samba-passdb-mysql-3.0.2a-3.2.100mdk.i586.rpm b34d77cf576bc3c6a39e50ccb04fc1ee 10.0/RPMS/samba-passdb-xml-3.0.2a-3.2.100mdk.i586.rpm 1a60acc6cc523537987c789daaa17b99 10.0/RPMS/samba-server-3.0.2a-3.2.100mdk.i586.rpm d5f09f07939dadda6d39ce619d918dce 10.0/RPMS/samba-swat-3.0.2a-3.2.100mdk.i586.rpm 3f4abab7d5fe16d8db612b07c1c1165d 10.0/RPMS/samba-winbind-3.0.2a-3.2.100mdk.i586.rpm 954256f8fb2dcbff886b1d6a4535bc03 10.0/SRPMS/samba-3.0.2a-3.2.100mdk.src.rpm Mandrakelinux 10.0/AMD64 cb4d44e5e85e240a61d601d94b423e82 amd64/10.0/RPMS/nss_wins-3.0.2a-3.2.100mdk.amd64.rpm 99906563140b9dee6e919ab4ca0e61fe amd64/10.0/RPMS/samba-client-3.0.2a-3.2.100mdk.amd64.rpm cf0c4f39aa078547923032562c170884 amd64/10.0/RPMS/samba-common-3.0.2a-3.2.100mdk.amd64.rpm a3a2cfd0fe222cf59408720a97eae315 amd64/10.0/RPMS/samba-doc-3.0.2a-3.2.100mdk.amd64.rpm 3adb7cbc3f031e1985fc356fd6cd28d6 amd64/10.0/RPMS/samba-passdb-mysql-3.0.2a-3.2.100mdk.amd64.rpm d3626d21a8dfd121e6126f2c20c68b12 amd64/10.0/RPMS/samba-passdb-xml-3.0.2a-3.2.100mdk.amd64.rpm 7bce8bf6a2ce61b6d067d29e50cb5959 amd64/10.0/RPMS/samba-server-3.0.2a-3.2.100mdk.amd64.rpm 820dbe19028f73bebf2c1615aa41506c amd64/10.0/RPMS/samba-swat-3.0.2a-3.2.100mdk.amd64.rpm 527d993e2e001ab8585d01f6abd5fed1 amd64/10.0/RPMS/samba-winbind-3.0.2a-3.2.100mdk.amd64.rpm 954256f8fb2dcbff886b1d6a4535bc03 amd64/10.0/SRPMS/samba-3.0.2a-3.2.100mdk.src.rpm Multi Network Firewall 8.2 30aff3d72c2c21f9a4adf930be4a4741 mnf8.2/RPMS/samba-client-2.2.7a-9.4.M82mdk.i586.rpm 2ef26ca649d580ef375a7f0f8680b764 mnf8.2/RPMS/samba-common-2.2.7a-9.4.M82mdk.i586.rpm b7ea85f4455756d7e7d1c9afe19977b5 mnf8.2/SRPMS/samba-2.2.7a-9.4.M82mdk.src.rpm Corporate Server 2.1 2e17c334f02b4247f1bf2f6e4b5837e3 corporate/2.1/RPMS/nss_wins-2.2.7a-10.2.C21mdk.i586.rpm a3c3a6dce249f920c2ebef2e42d22efb corporate/2.1/RPMS/samba-client-2.2.7a-10.2.C21mdk.i586.rpm 7e66a36c672abc713c3b78afa62cec4f corporate/2.1/RPMS/samba-common-2.2.7a-10.2.C21mdk.i586.rpm bf9cb0590bb03749f67b969a8ce47d5b corporate/2.1/RPMS/samba-doc-2.2.7a-10.2.C21mdk.i586.rpm ba68c6016296c95ba5e60b0caada3d7b corporate/2.1/RPMS/samba-server-2.2.7a-10.2.C21mdk.i586.rpm 33d9a4c1ad830727fcc8c0c74c15b133 corporate/2.1/RPMS/samba-swat-2.2.7a-10.2.C21mdk.i586.rpm 045eb0d5f4564a344dd1ec52affba34e corporate/2.1/RPMS/samba-winbind-2.2.7a-10.2.C21mdk.i586.rpm f24a2423c032564d94bc4fb7166aab93 corporate/2.1/SRPMS/samba-2.2.7a-10.2.C21mdk.src.rpm Corporate Server 2.1/X86_64 64cf3d1928c082f359ee77114a013c09 x86_64/corporate/2.1/RPMS/nss_wins-2.2.7a-10.2.C21mdk.x86_64.rpm cc53b273802b83a7bde754964f6c1a6a x86_64/corporate/2.1/RPMS/samba-client-2.2.7a-10.2.C21mdk.x86_64.rpm 5cb1a2021b4b122c1a43372afce7f4a7 x86_64/corporate/2.1/RPMS/samba-common-2.2.7a-10.2.C21mdk.x86_64.rpm 664628aa6e499379662cd6dda3eb3194 x86_64/corporate/2.1/RPMS/samba-doc-2.2.7a-10.2.C21mdk.x86_64.rpm 55a1275bee7a01f3a01629bfafade340 x86_64/corporate/2.1/RPMS/samba-server-2.2.7a-10.2.C21mdk.x86_64.rpm be77b207466e796e3f0625b3e6b2137f x86_64/corporate/2.1/RPMS/samba-swat-2.2.7a-10.2.C21mdk.x86_64.rpm fe9fad601a5c9086d49ec7c7ff5178db x86_64/corporate/2.1/RPMS/samba-winbind-2.2.7a-10.2.C21mdk.x86_64.rpm f24a2423c032564d94bc4fb7166aab93 x86_64/corporate/2.1/SRPMS/samba-2.2.7a-10.2.C21mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  17. Package name freeswan Date July 14th, 2004 Advisory ID MDKSA-2004:070 Affected versions 9.1, 9.2, 10.0, MNF8.2, CS2.1 Synopsis Updated freeswan and super-freeswan packages fix certificate chain authentication vulnerability Problem Description Thomas Walpuski discovered a vulnerability in the X.509 handling of super-freeswan, openswan, strongSwan, and FreeS/WAN with the X.509 patch applied. This vulnerability allows an attacker to make up their own Certificate Authority that can allow them to impersonate the identity of a valid DN. As well, another hole exists in the CA checking code that could create an endless loop in certain instances. Mandrakesoft encourages all users who use FreeS/WAN or super-freeswan to upgrade to the updated packages which are patched to correct these flaws. Updated Packages Mandrakelinux 9.1 1093013e9c096abc37376c121c61c129 9.1/RPMS/freeswan-1.99-3.1.91mdk.i586.rpm c186b6edc304f4c8543ff7acb93fbca4 9.1/SRPMS/freeswan-1.99-3.1.91mdk.src.rpm Mandrakelinux 9.2 193ed47d74da8b50811e2103fffef056 9.2/RPMS/freeswan-2.01-2.1.92mdk.i586.rpm 5a5c99eedc7a9df65b8d4e3d02501cfe 9.2/SRPMS/freeswan-2.01-2.1.92mdk.src.rpm Mandrakelinux 9.2/AMD64 45a782c82322e0f7c4377118475d5036 amd64/9.2/RPMS/freeswan-2.01-2.1.92mdk.amd64.rpm 5a5c99eedc7a9df65b8d4e3d02501cfe amd64/9.2/SRPMS/freeswan-2.01-2.1.92mdk.src.rpm Mandrakelinux 10.0 6c597ac14ac13e281d2f685e01cfb120 10.0/RPMS/freeswan-2.04-3.1.100mdk.i586.rpm 72975d40cd986612150eca445d123c69 10.0/RPMS/super-freeswan-1.99.8-8.1.100mdk.i586.rpm d26a97f445182fd6d37da1f0cb8b3a4a 10.0/RPMS/super-freeswan-doc-1.99.8-8.1.100mdk.i586.rpm 6428713ada795017334807aae1b8b9e1 10.0/SRPMS/freeswan-2.04-3.1.100mdk.src.rpm 0a8ea26452bf9275aca1f1b95c9997cc 10.0/SRPMS/super-freeswan-1.99.8-8.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64 3ae552614dc10d672956e82cc062ef40 amd64/10.0/RPMS/freeswan-2.04-3.1.100mdk.amd64.rpm 46d4b962019ca063a938057a817a015b amd64/10.0/RPMS/super-freeswan-1.99.8-8.1.100mdk.amd64.rpm 143b47584e409e517f2462a2311b37d8 amd64/10.0/RPMS/super-freeswan-doc-1.99.8-8.1.100mdk.amd64.rpm 6428713ada795017334807aae1b8b9e1 amd64/10.0/SRPMS/freeswan-2.04-3.1.100mdk.src.rpm 0a8ea26452bf9275aca1f1b95c9997cc amd64/10.0/SRPMS/super-freeswan-1.99.8-8.1.100mdk.src.rpm Multi Network Firewall 8.2 023520bddf59be203bda9eba76d29033 mnf8.2/RPMS/freeswan-1.98b-2.2.M82mdk.i586.rpm d0d04c3d0a1842ab7cbfc8eae726113a mnf8.2/SRPMS/freeswan-1.98b-2.2.M82mdk.src.rpm Corporate Server 2.1 5b7577b574dcbb4244f08546aa45f372 corporate/2.1/RPMS/freeswan-1.98b-3.1.C21mdk.i586.rpm 9b95691493ac84ad3ddce6f10f24ea0f corporate/2.1/SRPMS/freeswan-1.98b-3.1.C21mdk.src.rpm Corporate Server 2.1/X86_64 3dfdb78ce29582b6734f61c2c0973936 x86_64/corporate/2.1/RPMS/freeswan-1.98b-3.1.C21mdk.x86_64.rpm 9b95691493ac84ad3ddce6f10f24ea0f x86_64/corporate/2.1/SRPMS/freeswan-1.98b-3.1.C21mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0590 http://lists.openswan.org/pipermail/dev/20...une/000369.html http://www.openswan.org/support/vuln/can-2004-0590/ Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  18. Package name ipsec-tools Date July 14th, 2004 Advisory ID MDKSA-2004:069 Affected versions 10.0 Synopsis Updated ipsec-tools packages fix multiple vulnerabilities Problem Description A vulnerability in racoon prior to version 20040408a would allow a remote attacker to cause a DoS (memory consumption) via an ISAKMP packet with a large length field. Another vulnerability in racoon was discovered where, when using RSA signatures, racoon would validate the X.509 certificate but would not validate the signature. This can be exploited by an attacker sending a valid and trusted X.509 certificate and any private key. Using this, they could perform a man-in-the-middle attack and initiate an unauthorized connection. This has been fixed in ipsec-tools 0.3.3. The updated packages contain patches backported from 0.3.3 to correct the problem. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0403 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.
  19. 1.0 ADMINISTRATOR GUIDELINES AND DUTIES: 1.1 The role of our administration is to ensure the enforcement of this policy and to make decisions for the board. Admin decisions, as a group, are final. 1.2 Prior to implementing a decision that effects the board as a whole, the admin will give the other Admins and Mods time to provide input. Suggested time is at least 24 hours. If the Admin feels the decision needs to be implemented immediately, then the Admin will do it immediately and will post the reasoning for doing so. 1.3 Admin handling a decision makes the decision. The admin handling a case of a user being banned, will gather input from other admins/mods and then decide. 1.4 In the event that an admin's impartiality is compromised, that admin may not make a decision. A majority of the remaining admins will make this determination. 1.5 An admin decision may be over-ruled by 2/3rds of the remaining admins not involved in the original decision. 1.6 If an Admin violates guidelines, the decision enacted by the Admin must be reversed immediately. The other Admins will determine whether guidelines have been violated. The offending Admin may then present a case to have the decision implemented again. 2.0 MODERATOR GUIDELINES AND DUTIES: 2.1 Primary responsibility of a moderator is to enforce the guidelines, make needed corrections based on guidelines, and send PM's to users. They also post their actions in a mod forum. 2.2 The administrators and moderators of this forum have the right to edit, move or remove any topic at any time should they see fit. Removed topics are placed in a another forum, pending review. 2.3 A member found violating the guidelines will receive and explanation and if necessary, a warning. If said member ignores the warning or does not accept the warning, the member's account may be suspended by an admin pending review. 2.4 Any issues with users are turned over to admins. If a PM is sent to a user and the user responds back in any fashion other than accepting the PM, the mod posts it and admins will handle it. The only response that a mod should make is to state that the case is being turned over to an admin. Mods can continue to offer opinions through the Mod Forum. 2.5 In the event of a dispute with a moderator that you feel is not being resolved fairly, please send a personal message (PM) to any of the forum admins. Personal messages may be shared with other moderators and administrators. 2.6 Moderators will offer opinions on actions being implemented by admins. Mods can also suggest changes and gather input from other mods. 2.7 Moderators can manage their own duties and Moderator Forum as a group. This includes adding/removing new mods. Admin's will be considered a mod at this point. Their opinion counts like any mod. So if there is a poll, an admin can vote. Admin's will implement the decision.
  20. Oh, shush cybrjackle. It takes me about 4 days to get up and running w/kde. :P
  21. I use mm-sources 2.6.7. Just works better on my computer than development-sources.
  22. mystified

    Xine or mplayer?

    mplayer, it plays everything I think. Never used xine tho.
  23. I like your avatar tyme. I already told you that. :P
×
×
  • Create New...