news 28 Posted December 16, 2008 This is a multi-part message in MIME format... ------------=_1229401213-14940-5949 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2008:200 http://www.mandriva.com/security/ _______________________________________________________________________ Package : jackit Date : December 15, 2008 Affected: 2009.0 _______________________________________________________________________ Problem Description: This update provides the latest version of the JACK audio server. It is not provided to fix any specific bugs, but due to the recommendation of the JACK development community that all users should upgrade to 0.116.0 or later, as announced at http://jackaudio.org/. The release fixes many bugs and adds new features, most important among them being the integration of netjack functionality. _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: 493ee0c6bb98a7ae11d4840efeda5163 2009.0/i586/jackit-0.116.1-1.1mdv2009.0.i586.rpm c8304384bbf3ff56689acf8af2737bcc 2009.0/i586/jackit-example-clients-0.116.1-1.1mdv2009.0.i586.rpm 77259dafb74ba2190bd14ae33a7b2a77 2009.0/i586/libjack0-0.116.1-1.1mdv2009.0.i586.rpm dfe28ed53f13dbe0ac34624e3d8c663f 2009.0/i586/libjack-devel-0.116.1-1.1mdv2009.0.i586.rpm 6892a87b207d8ac86d542d64036ac1ee 2009.0/SRPMS/jackit-0.116.1-1.1mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 289f0439188ada9c1e18e096dde0b966 2009.0/x86_64/jackit-0.116.1-1.1mdv2009.0.x86_64.rpm 88dd22ed28688f822f0f048843bf28e1 2009.0/x86_64/jackit-example-clients-0.116.1-1.1mdv2009.0.x86_64.rpm ca7414d05ea37ceb17b5633c173acb12 2009.0/x86_64/lib64jack0-0.116.1-1.1mdv2009.0.x86_64.rpm 1d84ab7355f906ca95e2e0399c66b6f7 2009.0/x86_64/lib64jack-devel-0.116.1-1.1mdv2009.0.x86_64.rpm 6892a87b207d8ac86d542d64036ac1ee 2009.0/SRPMS/jackit-0.116.1-1.1mdv2009.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFJRwMvmqjQ0CJFipgRAvTTAKCDwKyjGSHMnLlULuDhkmi8RTRtmACeJsxC 5HSRJZZbjwra8Hdspo6KHsY= =RfEo -----END PGP SIGNATURE----- ------------=_1229401213-14940-5949 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1229401213-14940-5949-- Share this post Link to post