Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVA-2009:013 ] phonon

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1232409311-14940-7648

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Advisory MDVA-2009:013

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : phonon

Date : January 19, 2009

Affected: 2009.0

_______________________________________________________________________

 

Problem Description:

 

Phonon in Mandriva Linux 2009.0 was not able to read files with a

bracket in their filename. This update corrects the issue.

_______________________________________________________________________

 

References:

 

https://qa.mandriva.com/45950

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2009.0:

cf0a807f764a9fb21d40b2aff926d0e5 2009.0/i586/libphonon4-4.2.0-13.3mdv2009.0.i586.rpm

793a02c2bbc3149acacc1b5bf7b8801f 2009.0/i586/libphononexperimental4-4.2.0-13.3mdv2009.0.i586.rpm

a69d9faa3c24407b62ae78a8d1bef799 2009.0/i586/phonon-devel-4.2.0-13.3mdv2009.0.i586.rpm

dac8dc609f96e9cb3bb2f7dd0fe7e779 2009.0/i586/phonon-gstreamer-4.2.0-13.3mdv2009.0.i586.rpm

0bf7c34194be10c377185ddf75fcac15 2009.0/SRPMS/phonon-4.2.0-13.3mdv2009.0.src.rpm

 

Mandriva Linux 2009.0/X86_64:

973a2887b347817e9243f54a49d21046 2009.0/x86_64/lib64phonon4-4.2.0-13.3mdv2009.0.x86_64.rpm

ec002fef927c09f4bf8ce168ce6f4a6b 2009.0/x86_64/lib64phononexperimental4-4.2.0-13.3mdv2009.0.x86_64.rpm

a7e8fd5e78a344c5bc915889c1a06a64 2009.0/x86_64/phonon-devel-4.2.0-13.3mdv2009.0.x86_64.rpm

27ec01a8e0a6c3bf46ec4b9991a0d744 2009.0/x86_64/phonon-gstreamer-4.2.0-13.3mdv2009.0.x86_64.rpm

0bf7c34194be10c377185ddf75fcac15 2009.0/SRPMS/phonon-4.2.0-13.3mdv2009.0.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFJdOlPmqjQ0CJFipgRAiK5AKCXq79Dcd1CclSSrO5AZ7pBjYvv5QCdHPzE

cye26nBXkPUfGw3LhFIoRX4=

=bM0I

-----END PGP SIGNATURE-----

 

 

------------=_1232409311-14940-7648

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1232409311-14940-7648--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×