Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVA-2008:163 ] mdkonline

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1225398317-14940-1723

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Advisory MDVA-2008:163

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : mdkonline

Date : October 30, 2008

Affected: 2008.1, 2009.0

_______________________________________________________________________

 

Problem Description:

 

This update ensures that the distribution upgrade notification is not

detected in incorrect cases, and ensures that a distribution upgrade is

only suggested after all security updates have been applied. It also

improves the distribution upgrade confirmation dialog and reliability

of network package installation.

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2008.1:

6b94d5b5486a1a2e4b5807d592e9029a 2008.1/i586/gurpmi-5.19.10-1.1mdv2008.1.noarch.rpm

d386d210c97606c6c4055980bef4ed07 2008.1/i586/mdkonline-2.67-1mdv2008.1.noarch.rpm

9f48ad91f539a982818918b8977f1f1d 2008.1/i586/rpmdrake-4.9.13.6-1.1mdv2008.1.noarch.rpm

da904e296bb96e5cc4d350a0162f0b36 2008.1/i586/urpmi-5.19.10-1.1mdv2008.1.noarch.rpm

a900c92f719fbf232bfbfed2918c08b8 2008.1/i586/urpmi-ldap-5.19.10-1.1mdv2008.1.noarch.rpm

944bc0cf95d9140d5419c83e62d5814c 2008.1/i586/urpmi-parallel-ka-run-5.19.10-1.1mdv2008.1.noarch.rpm

abddb36a253788ee5ae8e6e965d28efe 2008.1/i586/urpmi-parallel-ssh-5.19.10-1.1mdv2008.1.noarch.rpm

a2046664aab446c5bc4f944d46a4f793 2008.1/i586/urpmi-recover-5.19.10-1.1mdv2008.1.noarch.rpm

48384b5215d4649f4fe25764af0e0f66 2008.1/SRPMS/mdkonline-2.67-1mdv2008.1.src.rpm

d77c27770f70c246fcc010ddefb98c37 2008.1/SRPMS/rpmdrake-4.9.13.6-1.1mdv2008.1.src.rpm

ba8b4bb61e150b6b0a02c64c24f95570 2008.1/SRPMS/urpmi-5.19.10-1.1mdv2008.1.src.rpm

 

Mandriva Linux 2008.1/X86_64:

91e6e0219061c99a296766cfb631bfde 2008.1/x86_64/gurpmi-5.19.10-1.1mdv2008.1.noarch.rpm

f1b3730f71c1d95362cb6393ddc096b1 2008.1/x86_64/mdkonline-2.67-1mdv2008.1.noarch.rpm

10fafa12c7932a35b84a4ad14fa402a2 2008.1/x86_64/rpmdrake-4.9.13.6-1.1mdv2008.1.noarch.rpm

be1fa0f0d81ca2a57172b79fd3322f3d 2008.1/x86_64/urpmi-5.19.10-1.1mdv2008.1.noarch.rpm

fef53d719154b7a0f9682a8ad45d9641 2008.1/x86_64/urpmi-ldap-5.19.10-1.1mdv2008.1.noarch.rpm

108b9b2451ca4c60f8353c660241f0a3 2008.1/x86_64/urpmi-parallel-ka-run-5.19.10-1.1mdv2008.1.noarch.rpm

4506715a42b58a911debecd54cc71c24 2008.1/x86_64/urpmi-parallel-ssh-5.19.10-1.1mdv2008.1.noarch.rpm

7775df262f50dc00e0d381b86e0e3679 2008.1/x86_64/urpmi-recover-5.19.10-1.1mdv2008.1.noarch.rpm

48384b5215d4649f4fe25764af0e0f66 2008.1/SRPMS/mdkonline-2.67-1mdv2008.1.src.rpm

d77c27770f70c246fcc010ddefb98c37 2008.1/SRPMS/rpmdrake-4.9.13.6-1.1mdv2008.1.src.rpm

ba8b4bb61e150b6b0a02c64c24f95570 2008.1/SRPMS/urpmi-5.19.10-1.1mdv2008.1.src.rpm

 

Mandriva Linux 2009.0:

71aa7421cf87988fa9cb94f6d1c8ceea 2009.0/i586/aria2-0.15.3-0.20080918.3mdv2009.0.i586.rpm

fabf6d6fdf363f3678ee384c4090ce3d 2009.0/i586/gurpmi-6.14.11-1mdv2009.0.noarch.rpm

22e10518477527056330eca413585bee 2009.0/i586/mdkonline-2.67-1mdv2009.0.noarch.rpm

fec54551d58980026da91d2105bfed5c 2009.0/i586/perl-URPM-3.18.1-1mdv2009.0.i586.rpm

1279af7ff835ed259cb1fa833c3bf903 2009.0/i586/rpmdrake-5.0.3-1mdv2009.0.noarch.rpm

81c100bce9c6514c80cf0908fbb23204 2009.0/i586/urpmi-6.14.11-1mdv2009.0.noarch.rpm

66d0eeb66c0e629c5782ea8574f2ac4b 2009.0/i586/urpmi-ldap-6.14.11-1mdv2009.0.noarch.rpm

4be42bed0a462199954ed6c836ddf7f4 2009.0/i586/urpmi-parallel-ka-run-6.14.11-1mdv2009.0.noarch.rpm

d02ac6d24fabb2e918af37b97972e5b0 2009.0/i586/urpmi-parallel-ssh-6.14.11-1mdv2009.0.noarch.rpm

bcbe3e21a1a97f96b516030f7066636c 2009.0/i586/urpmi-recover-6.14.11-1mdv2009.0.noarch.rpm

9205ef5c2a642274ef6ccb2f4a941a36 2009.0/SRPMS/aria2-0.15.3-0.20080918.3mdv2009.0.src.rpm

10a6a91bb601b82199df3221f14094c6 2009.0/SRPMS/mdkonline-2.67-1mdv2009.0.src.rpm

2a468ef5184f336d712c244a38cd38af 2009.0/SRPMS/perl-URPM-3.18.1-1mdv2009.0.src.rpm

5bceaebd5f567e0260c1950177977755 2009.0/SRPMS/rpmdrake-5.0.3-1mdv2009.0.src.rpm

ffee5a3047799a7802ebb9c17a167aa9 2009.0/SRPMS/urpmi-6.14.11-1mdv2009.0.src.rpm

 

Mandriva Linux 2009.0/X86_64:

1524aa4ee95000112155da605c1cd26c 2009.0/x86_64/aria2-0.15.3-0.20080918.3mdv2009.0.x86_64.rpm

28e4f63766d691637a10aeb347e41ca4 2009.0/x86_64/gurpmi-6.14.11-1mdv2009.0.noarch.rpm

93ff42e13df4e36db79bd2979519915a 2009.0/x86_64/mdkonline-2.67-1mdv2009.0.noarch.rpm

3837d910b460d817fc2db1759fe9af64 2009.0/x86_64/perl-URPM-3.18.1-1mdv2009.0.x86_64.rpm

0086447409841feddec41d1b18efebfc 2009.0/x86_64/rpmdrake-5.0.3-1mdv2009.0.noarch.rpm

3c9bfa6ad8e0d6884eab9e283cfbedfb 2009.0/x86_64/urpmi-6.14.11-1mdv2009.0.noarch.rpm

9ae44d2eccddc644c40f5886f6ae8b4e 2009.0/x86_64/urpmi-ldap-6.14.11-1mdv2009.0.noarch.rpm

ede6947cc85fffcaa4af2d0deee307d2 2009.0/x86_64/urpmi-parallel-ka-run-6.14.11-1mdv2009.0.noarch.rpm

834b54fc2f63fa85d91d574367610cd3 2009.0/x86_64/urpmi-parallel-ssh-6.14.11-1mdv2009.0.noarch.rpm

014510f2c8bb64cbc9431cd37c8cbeb4 2009.0/x86_64/urpmi-recover-6.14.11-1mdv2009.0.noarch.rpm

9205ef5c2a642274ef6ccb2f4a941a36 2009.0/SRPMS/aria2-0.15.3-0.20080918.3mdv2009.0.src.rpm

10a6a91bb601b82199df3221f14094c6 2009.0/SRPMS/mdkonline-2.67-1mdv2009.0.src.rpm

2a468ef5184f336d712c244a38cd38af 2009.0/SRPMS/perl-URPM-3.18.1-1mdv2009.0.src.rpm

5bceaebd5f567e0260c1950177977755 2009.0/SRPMS/rpmdrake-5.0.3-1mdv2009.0.src.rpm

ffee5a3047799a7802ebb9c17a167aa9 2009.0/SRPMS/urpmi-6.14.11-1mdv2009.0.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFJCe0zmqjQ0CJFipgRAmawAJ4jxPp1cFjJxI5eQOk0MUYBd2R9UQCfaMKu

/ObejOkIczpgt2VJB21IhGE=

=b3vA

-----END PGP SIGNATURE-----

 

 

------------=_1225398317-14940-1723

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1225398317-14940-1723--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×